General
-
Target
7c171a51686b7da6c4d9178093164888ff30f9be7b4e38412db3c8b98b595cd0.exe
-
Size
465KB
-
Sample
240926-cbl2kszgmj
-
MD5
4c128449b1492fc2ff49c431044d4b10
-
SHA1
b7b77ae75cd5adfa5aa1c49d48396f5b66a79441
-
SHA256
7c171a51686b7da6c4d9178093164888ff30f9be7b4e38412db3c8b98b595cd0
-
SHA512
116999bf606a5fc696c0f9c7cf55361c6bba5f26881cd6bce525ca3c95e2676af75be7eea0155cd37b8891fe7d391e4a69887b5fe95de3788b18f7dc2c6924cc
-
SSDEEP
6144:bTz+c6KHYBhDc1RGJdv//NkUn+N5Bkf/0TELRvIZPjbsAOZZmAX4crmT4:bTlrYw1RUh3NFn+N5WfIQIjbs/ZmdT4
Behavioral task
behavioral1
Sample
7c171a51686b7da6c4d9178093164888ff30f9be7b4e38412db3c8b98b595cd0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7c171a51686b7da6c4d9178093164888ff30f9be7b4e38412db3c8b98b595cd0.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
remcos
NeonLauncher
5.20.120.177:2404
-
audio_folder
Microsoft
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
Windows Driver Server.exe
-
copy_folder
Microsoft
-
delete_file
true
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
_temp.dat
-
keylog_flag
false
-
keylog_folder
Microsoft
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Rmc-HWAIZA
-
screenshot_crypt
true
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
- startup_value
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
7c171a51686b7da6c4d9178093164888ff30f9be7b4e38412db3c8b98b595cd0.exe
-
Size
465KB
-
MD5
4c128449b1492fc2ff49c431044d4b10
-
SHA1
b7b77ae75cd5adfa5aa1c49d48396f5b66a79441
-
SHA256
7c171a51686b7da6c4d9178093164888ff30f9be7b4e38412db3c8b98b595cd0
-
SHA512
116999bf606a5fc696c0f9c7cf55361c6bba5f26881cd6bce525ca3c95e2676af75be7eea0155cd37b8891fe7d391e4a69887b5fe95de3788b18f7dc2c6924cc
-
SSDEEP
6144:bTz+c6KHYBhDc1RGJdv//NkUn+N5Bkf/0TELRvIZPjbsAOZZmAX4crmT4:bTlrYw1RUh3NFn+N5WfIQIjbs/ZmdT4
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-