Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    Quote.exe

  • Size

    1.6MB

  • Sample

    241008-vwd6kszfnc

  • MD5

    2e58a14f3a8d78298aee99cb4ea39adc

  • SHA1

    90c96e8671f739a0a20daaafab1567d3c457a612

  • SHA256

    83fd4f6c8ca4ae094ea629eda985b11e495aa8f6c8421970ef8573a50808e344

  • SHA512

    71f115edb7c4013458f957473aa943a910d509f2a94b0ab6e57e84d13e458c17571702830a3eb7cf9e784e52ff1c986e35088a7ce7ab094c48f818d2a7fa6a5d

  • SSDEEP

    24576:ffmMv6Ckr7Mny5QLH0yTfIXPlFb2wjVkwAE9owb7uVJnIJYKR3prW4BoPEK8X3PR:f3v+7/5QLVYdkQ99b7ujIJjixkyKi87

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

www.projectusf.com:2404

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    gfh

  • mouse_option

    false

  • mutex

    Rmc-J91LMC

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      Quote.exe

    • Size

      1.6MB

    • MD5

      2e58a14f3a8d78298aee99cb4ea39adc

    • SHA1

      90c96e8671f739a0a20daaafab1567d3c457a612

    • SHA256

      83fd4f6c8ca4ae094ea629eda985b11e495aa8f6c8421970ef8573a50808e344

    • SHA512

      71f115edb7c4013458f957473aa943a910d509f2a94b0ab6e57e84d13e458c17571702830a3eb7cf9e784e52ff1c986e35088a7ce7ab094c48f818d2a7fa6a5d

    • SSDEEP

      24576:ffmMv6Ckr7Mny5QLH0yTfIXPlFb2wjVkwAE9owb7uVJnIJYKR3prW4BoPEK8X3PR:f3v+7/5QLVYdkQ99b7ujIJjixkyKi87

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook accounts

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.