General
-
Target
na.hta
-
Size
118KB
-
Sample
241015-pzlryaygrp
-
MD5
3734b6b1d8a5b84814fa08ce7b1ef6c7
-
SHA1
b89ece297f8abe5e32931f3589d572f50b5036a8
-
SHA256
b2c7816147d7816cf870f2088aa7be410616f1b639214904a56e49e580c89580
-
SHA512
add36444b8322aac9b7300081dd67a7d887427dd1d9d0c71115f1a2f4f9427e88b38b7c2158e715e6200fcc794d529611c9f4ac81c7ff10d86a9c996ac01ef8e
-
SSDEEP
96:Eam73N7J8BZ7t8BIyEQ2XVVAfUFup/JJ5757N8BnL7i7T:Ea23N7u7nyEQUVA8cb757qL74T
Static task
static1
Behavioral task
behavioral1
Sample
na.hta
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
na.hta
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://raw.githubusercontent.com/CryptersAndToolsOficial/ZIP/refs/heads/main/DetahNote_V.jpg%20
https://raw.githubusercontent.com/CryptersAndToolsOficial/ZIP/refs/heads/main/DetahNote_V.jpg%20
Extracted
remcos
authur
authurremc.duckdns.org:14645
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-7B1J99
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
na.hta
-
Size
118KB
-
MD5
3734b6b1d8a5b84814fa08ce7b1ef6c7
-
SHA1
b89ece297f8abe5e32931f3589d572f50b5036a8
-
SHA256
b2c7816147d7816cf870f2088aa7be410616f1b639214904a56e49e580c89580
-
SHA512
add36444b8322aac9b7300081dd67a7d887427dd1d9d0c71115f1a2f4f9427e88b38b7c2158e715e6200fcc794d529611c9f4ac81c7ff10d86a9c996ac01ef8e
-
SSDEEP
96:Eam73N7J8BZ7t8BIyEQ2XVVAfUFup/JJ5757N8BnL7i7T:Ea23N7u7nyEQUVA8cb757qL74T
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Blocklisted process makes network request
-
Evasion via Device Credential Deployment
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook accounts
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-