General
-
Target
88808878b0b9a2ab754f937b42717d3f201c0fdbd23df95d6190d8f2b60f3b35
-
Size
2.7MB
-
Sample
241001-qya5gssckl
-
MD5
04516e56fa7b3e62d6f7b2b03e9e31f7
-
SHA1
18173f9d7b88632a20de8a3994eacaf8752f2aad
-
SHA256
88808878b0b9a2ab754f937b42717d3f201c0fdbd23df95d6190d8f2b60f3b35
-
SHA512
f4a420b249e300cfcca6ccdd9cf2d4ce063d5dc4457b48956efadd89ac94b4210a1f566ffb11488afe451ece2e860b8c8ad434f9c2df822a5b62d008402ba5d3
-
SSDEEP
49152:I4g/2lTiU4OlZD7M/4MfjuA+zXc4BzBNp5gOqt9uKIz3qGgsLQzz:It/2lWTED24MfSA+s4dpi9IbWsLkz
Static task
static1
Behavioral task
behavioral1
Sample
PO 0846590-042754-Project Order.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PO 0846590-042754-Project Order.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
remcos
RemoteHost
204.10.160.212:6622
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-98KSNN
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
PO 0846590-042754-Project Order.exe
-
Size
3.0MB
-
MD5
73453d5c0008f9b1e1699517d3526654
-
SHA1
512ab1544de7bef5b18a3d7e8f1b5013feba6e99
-
SHA256
a4c6b21fa9d2529e4622652f241d344dc93ec3513eb695917b1efc3f23ca17f6
-
SHA512
6e7e36541c0b53471c2496e10fa96930521f402b9fc9ecd303783197aea4421d5982ad88396529330d22dd30dd8564083c58bb7bd1fc7290e8f31b87856e83bc
-
SSDEEP
49152:f3v+7/5QLV9iWmQxtx/wBKG7FwwKX5cQBxBhJXgoKtNA0w1bqassZQRL:f3v+7y4ZaxaKG7SwU6QnJE/wxssZkL
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-