General
-
Target
39ec963bdfd683141a24c10435e4a6104375f5c1f61af2053b017ee55b84d1c1.exe
-
Size
36KB
-
Sample
240928-kel5raydqh
-
MD5
9aa54216394c3620f7e6131a00acd8f1
-
SHA1
e5016252d0fc9dc04bceef0334ca93d11e2bbdde
-
SHA256
39ec963bdfd683141a24c10435e4a6104375f5c1f61af2053b017ee55b84d1c1
-
SHA512
dda82fe927253230e36902f4a351e470703af3cb168984298689c7f37e293871d18eeace33ba6003c1b69727cad0a8ada740e7ec7bb428cae5a0417343a78b0c
-
SSDEEP
768:/5PHyCjmhFdWfLubuZ1kvIaEekM2em014r1:/5PHfjGPAKbLVS9r
Behavioral task
behavioral1
Sample
39ec963bdfd683141a24c10435e4a6104375f5c1f61af2053b017ee55b84d1c1.exe
Resource
win7-20240903-en
Malware Config
Extracted
remcos
1.7 Pro
Host
dmak777.ddns.net:6522
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
system.exe
-
copy_folder
system
-
delete_file
true
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%ProgramFiles%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
system
-
keylog_path
%AppData%
-
mouse_option
true
-
mutex
owgaigcjgxyjhgfds
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screens
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
system
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
39ec963bdfd683141a24c10435e4a6104375f5c1f61af2053b017ee55b84d1c1.exe
-
Size
36KB
-
MD5
9aa54216394c3620f7e6131a00acd8f1
-
SHA1
e5016252d0fc9dc04bceef0334ca93d11e2bbdde
-
SHA256
39ec963bdfd683141a24c10435e4a6104375f5c1f61af2053b017ee55b84d1c1
-
SHA512
dda82fe927253230e36902f4a351e470703af3cb168984298689c7f37e293871d18eeace33ba6003c1b69727cad0a8ada740e7ec7bb428cae5a0417343a78b0c
-
SSDEEP
768:/5PHyCjmhFdWfLubuZ1kvIaEekM2em014r1:/5PHfjGPAKbLVS9r
-
Modifies WinLogon for persistence
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Adds policy Run key to start application
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Modifies WinLogon
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
2Winlogon Helper DLL
2Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
2Winlogon Helper DLL
2Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
6Virtualization/Sandbox Evasion
1