General
-
Target
fa2b7bf295ebf55e26e4ddeaaf8b5119b5332b3b6c184a530532d162411bc3b4.gz
-
Size
843KB
-
Sample
240926-c6v8qswclb
-
MD5
b071c4aeb1f47099f280b1e16d2612dd
-
SHA1
ea7efc0a70ddb2f1a10ac3da541a708873965628
-
SHA256
fa2b7bf295ebf55e26e4ddeaaf8b5119b5332b3b6c184a530532d162411bc3b4
-
SHA512
dda22470a1e63caa2a8b8cd2cc86a48a655a8a14669d5831bacbf25c6fbcbbc7b23fa39ddcc88b3a2532da0d7165ff2e0c0d6e934bae92ab15103e1ae0730110
-
SSDEEP
12288:NpAxzatS8nTEaAaqGW7Vhfs4D362RQmwBiqW4iaidhcVTi9jbWWYaqIe:NMmvTEaAaPWJhfM2MiZxaidhOP
Static task
static1
Behavioral task
behavioral1
Sample
Confirmation Order.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Confirmation Order.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
remcos
RemoteHost
127.0.0.1:59321
nnamoo.duckdns.org:59321
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-41EVS0
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
Confirmation Order.exe
-
Size
892KB
-
MD5
3b13b07b05ea3f2084ee3c38080fffe3
-
SHA1
dde112544004281ad7d02b36c607bc4a258f22a6
-
SHA256
b93408af1dfa127e3b11d16cd92dab65f448d77fa933259c139bb0f0e6d33a75
-
SHA512
c09987d78d52fc94bc991b40380b6f5752f1b15139850d24ed93e9ea8ce74add4b4b477493fb8c0a6980de9e14fb511123e2571622c3c5a46f4402f09d037fe0
-
SSDEEP
12288:5Eqv8RratEshTEMAiqoWpVvfS4D36FUOJT02id9IV/SxjTWAY+acgp8bQbQk:J8OZTEMAifWTvfuL42id94cgGIQ
Score10/10-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-