General
-
Target
Company Details.exe
-
Size
988KB
-
Sample
240919-pnb4csyaqf
-
MD5
dc6296c1f5ec3b6e4dcbc33d0fcf3616
-
SHA1
64c81ccb99415efe3aaffcfeea93d15fc08b735b
-
SHA256
d776f6152105609e96a665bf681b71c945da8341b326410ee20e6a31b234d4c9
-
SHA512
e28695c316d1b5d2d35726ed3f68ebccc1d07083d3b533b90ac9a1cf697ebbee8794278625107f305e22b55c68a1a820a73103f208f6f6a0f40ecf24f4b5db98
-
SSDEEP
24576:72R1pA1DLK3qSmuyhBaNV8DDCANtsMFSzraULSgk:OPA1DLKagy4V8DftsgSzraR
Static task
static1
Behavioral task
behavioral1
Sample
Company Details.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Company Details.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
remcos
RemoteHost
127.0.0.1:59321
nnamoo.duckdns.org:59321
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-41EVS0
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
Company Details.exe
-
Size
988KB
-
MD5
dc6296c1f5ec3b6e4dcbc33d0fcf3616
-
SHA1
64c81ccb99415efe3aaffcfeea93d15fc08b735b
-
SHA256
d776f6152105609e96a665bf681b71c945da8341b326410ee20e6a31b234d4c9
-
SHA512
e28695c316d1b5d2d35726ed3f68ebccc1d07083d3b533b90ac9a1cf697ebbee8794278625107f305e22b55c68a1a820a73103f208f6f6a0f40ecf24f4b5db98
-
SSDEEP
24576:72R1pA1DLK3qSmuyhBaNV8DDCANtsMFSzraULSgk:OPA1DLKagy4V8DftsgSzraR
Score10/10-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-