General
-
Target
e75d89005adeafb02569935dda90cf8fceaef980e37085e77b03ef7f50319f33
-
Size
1.4MB
-
Sample
240919-dakb2axcql
-
MD5
f0c77ba203c86d16b54e5f32548fa5eb
-
SHA1
9ff47adf82b2d27559e69f0c34fd02fc7736620e
-
SHA256
e75d89005adeafb02569935dda90cf8fceaef980e37085e77b03ef7f50319f33
-
SHA512
ce3410cfa130c00e202d972cea6e742b047659b8f5938a67edd9090a62c30effa2378f1ddf03463131ae93db0f45e09c746f87b771a1b24058780051f6975078
-
SSDEEP
24576:af7p9g9Dr901YEIQb+jfpDUG+c7xambfxMs/BxG2oeWzeNU8UPwR2hDFA:azp94rqqEINjxJ7xaAJl/BxG2BseNU8T
Static task
static1
Behavioral task
behavioral1
Sample
MV PANCON GLORY.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
MV PANCON GLORY.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
remcos
RemoteHost
154.216.18.214:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-AOD6MB
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
MV PANCON GLORY.exe
-
Size
1.7MB
-
MD5
55b810b77aa58d8cb1e02f881fd07e46
-
SHA1
cf5ffc9c3463622558956b848e3f01c1cef7a6d4
-
SHA256
b24eb77259ac5226e788939613b85a33dac0f412f980d0ff27308bc7f4fd70f3
-
SHA512
0ece180c39e8c152da5858be0fe757c1655d56bb24de2229b40123abf5f223578ac14b8614840cb143bb5369022c818bb972608ac44e796bdeedf4b793c1fc59
-
SSDEEP
49152:7JZoQrbTFZY1iaCDEIJjF/Nzcwp/HBxGEBseDUaU3q45:7trbTA10kwxPvXU3H
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-