General
-
Target
9726f35d26663a77e4ed6528b2062c651778d6d7852afa60c8c5b6254a4ae67a
-
Size
1.4MB
-
Sample
240916-bn2r5ascrl
-
MD5
af04f739f66a357841e5938165784dff
-
SHA1
da5452ce3e8081ac445df75fa40f825d56e8e3d8
-
SHA256
9726f35d26663a77e4ed6528b2062c651778d6d7852afa60c8c5b6254a4ae67a
-
SHA512
4f06f6daf96b5197221f9adbda635735d2f8c6e79fc9712871d887c605d0f9e669f9c58945e7a771c855773e3186293c944cd9789270d352c3a6ad8966977e4f
-
SSDEEP
24576:mS17+gMFp5qC+YbUi1ejqwUxvcUnfPw+XkOwHXZLYjP2457BJ1yoC3AnyaF4:mm+gqZUi1TwUxvcU3TXq824Jkv3Anyau
Static task
static1
Behavioral task
behavioral1
Sample
RFQ_pdf.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
RFQ_pdf.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
remcos
RemoteHost
154.216.18.214:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-AOD6MB
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
RFQ_pdf.exe
-
Size
1.9MB
-
MD5
cca5ff9ed1bf853256cf60a14951b593
-
SHA1
ab083cbbfca89e9422f8a6f196c248ebc13d738b
-
SHA256
6a0274af2601d8713f03e1914c9d12cd2537ad6c542242b5b2c458e5915e532d
-
SHA512
7027f633973c646c1c6db9e44e262e29547a179a30a1ddbcaef9a068591b3192ebf8ad9551785144cae77f3911709320f16c62336dcabc701076ba2598bdfca4
-
SSDEEP
49152:OTvC/MTQYxsWR7aNYTOcVvAUBlXOOyYvSHzAB:GjTQYxsWRxvv5bK
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-