General
-
Target
verynicegirlneedsuperkiisingfromtheboy.hta
-
Size
130KB
-
Sample
241017-rq31zathlp
-
MD5
bfa06f35d87c1939017d70c204d3a7d5
-
SHA1
bb80945300d62122564399f088f09d1760172c20
-
SHA256
c6e6ef4d2a7c8dc43e114496de98a777e783cd554aa258736ef126ff8628d8c2
-
SHA512
04465026afe312e8fa1420d8341f57c2742c2ee4ccc57f65659b77d31cc6cfa084787f587114fa05b75d8b0fcee87d55d67e162fb75f3ec92c0e9f5c4a06b0fa
-
SSDEEP
96:Eam7SVApoWIApM8RM9vZnQ8vFYDJuPPxfiApohP7T:Ea2SVAqzAelZFYF3AEDT
Static task
static1
Behavioral task
behavioral1
Sample
verynicegirlneedsuperkiisingfromtheboy.hta
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
verynicegirlneedsuperkiisingfromtheboy.hta
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://raw.githubusercontent.com/CryptersAndToolsOficial/ZIP/refs/heads/main/DetahNote_V.jpg%20
https://raw.githubusercontent.com/CryptersAndToolsOficial/ZIP/refs/heads/main/DetahNote_V.jpg%20
Extracted
remcos
RemoteHost
idabo.duckdns.org:6875
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-0MWW62
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
verynicegirlneedsuperkiisingfromtheboy.hta
-
Size
130KB
-
MD5
bfa06f35d87c1939017d70c204d3a7d5
-
SHA1
bb80945300d62122564399f088f09d1760172c20
-
SHA256
c6e6ef4d2a7c8dc43e114496de98a777e783cd554aa258736ef126ff8628d8c2
-
SHA512
04465026afe312e8fa1420d8341f57c2742c2ee4ccc57f65659b77d31cc6cfa084787f587114fa05b75d8b0fcee87d55d67e162fb75f3ec92c0e9f5c4a06b0fa
-
SSDEEP
96:Eam7SVApoWIApM8RM9vZnQ8vFYDJuPPxfiApohP7T:Ea2SVAqzAelZFYF3AEDT
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Blocklisted process makes network request
-
Evasion via Device Credential Deployment
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook accounts
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-