General
-
Target
MOVIMIENTO BANCARIO EN LINEA - PAGO REALIZADO (1).eml
-
Size
19KB
-
Sample
241009-w3jkbawaja
-
MD5
0e204a7f452ac12937c29c1ba8ff7e73
-
SHA1
70a7fffb6318bbae045f6194f20b4c9580394597
-
SHA256
7d714cbb29c50203b38dc40fb727d9e6a071f53062f506631717ce9a2f44bb33
-
SHA512
ed17da3e20ca15af013f68b6b16a577df6a2927776fcc7c04fb6dadfa703c681a3fe1444be99d47014e536603f2024b6355f315b5c1561b46030ef9963f80de8
-
SSDEEP
384:sUKh9yr4zgvrGlgPUGM2tTNLIMqIAnCZGwPF83uwcckhSCZt/I5K+g9wt:0ciEn9Nrqx2VF8+LJv/3/W
Static task
static1
Behavioral task
behavioral1
Sample
MOVIMIENTO BANCARIO EN LINEA - PAGO REALIZADO (1).eml
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
MOVIMIENTO BANCARIO EN LINEA - PAGO REALIZADO (1).eml
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
H.png
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
H.png
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
email-html-2.html
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
email-html-2.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
email-plain-1.txt
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
email-plain-1.txt
Resource
win10v2004-20241007-en
Malware Config
Extracted
remcos
GOLGOLGOL
dfgdfghghfhfh.con-ip.com:1668
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-1GL4HH
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
MOVIMIENTO BANCARIO EN LINEA - PAGO REALIZADO (1).eml
-
Size
19KB
-
MD5
0e204a7f452ac12937c29c1ba8ff7e73
-
SHA1
70a7fffb6318bbae045f6194f20b4c9580394597
-
SHA256
7d714cbb29c50203b38dc40fb727d9e6a071f53062f506631717ce9a2f44bb33
-
SHA512
ed17da3e20ca15af013f68b6b16a577df6a2927776fcc7c04fb6dadfa703c681a3fe1444be99d47014e536603f2024b6355f315b5c1561b46030ef9963f80de8
-
SSDEEP
384:sUKh9yr4zgvrGlgPUGM2tTNLIMqIAnCZGwPF83uwcckhSCZt/I5K+g9wt:0ciEn9Nrqx2VF8+LJv/3/W
Score10/10-
Adds Run key to start application
-
Drops file in System32 directory
-
-
-
Target
H.png
-
Size
7KB
-
MD5
479fa49d6b40a02b49c93e072be80d04
-
SHA1
c240cf8b0f9a5737bcc97257d0943bf89845ef84
-
SHA256
f35fb0076d9b4d2de9ebbe4ff31be3e85b77421c53ae91732ace50e910bcde8b
-
SHA512
3111b8c76159af6a200f75ec41a6da67d72e33350b94a48fc49662bda399a95e5b8bfd962e3904990e5b5917aa5b3982357ca1a5e253e3afee7ce271b2efdbc7
-
SSDEEP
192:RMWesmQSig2lYJ9gqyzGobdXamupsFCoAUKx:RMWeJQzg2liiGobdqRphn
Score3/10 -
-
-
Target
email-html-2.txt
-
Size
1KB
-
MD5
749fa1488f03feb1b93d704c27229d27
-
SHA1
a344de07bd010c8eb4841878b46ee87d6afb9327
-
SHA256
fd973db95cf670b9552f351c180865a9221768e3ac645a02395a182e8d906c14
-
SHA512
92ef8228b6475744bd22a24d4420674a2d9e261080fc8f2144fdbfc9b4bdfdb2f0a4ee9cd72fe28f94df169cc0ee8c68c8779de36e476e57c6bba1fd47364cc2
Score3/10 -
-
-
Target
email-plain-1.txt
-
Size
745B
-
MD5
494b4e5fc51de9d89941f7c6d00e06a3
-
SHA1
46499bce6b745bb2796d30ff5d492e625501b20a
-
SHA256
dfb9db1d31774ef0133e78ef39736e676d7dbad85f36b5c96a8dc4b50d9f654a
-
SHA512
f2343337333ebdae2ade2158f468d3192b3bded59dc801a33580914c0a99e76000d45bba4787eedb0ffb960cd3b0719a6a5923f811733774a506893cef2d3abc
Score1/10 -