General
-
Target
1e3540baabf42245189b60b29a9bc799c35f6c4f6205f06c5efe449166cc0791
-
Size
139KB
-
Sample
241019-xre87avdkn
-
MD5
c18ed22232aa0d8b06ddd20fabcea7af
-
SHA1
a4be87e0c083353de36a6c1bd531dbb8a2087f66
-
SHA256
1e3540baabf42245189b60b29a9bc799c35f6c4f6205f06c5efe449166cc0791
-
SHA512
1582a6a57cc8ed4248e4936e0abc9c5bef0a0275c865b20a0f30e84d97faa1088e4ce365bb4361db75fdda6b0d292be1f35c7daa2e8abba5dddd7599aed69f86
-
SSDEEP
3072:xPd4n/M+WLcilrpgGH/GwY87mVmIXhIHVSV:xP6/M+WLckOBhVmIYY
Static task
static1
Behavioral task
behavioral1
Sample
1e3540baabf42245189b60b29a9bc799c35f6c4f6205f06c5efe449166cc0791.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1e3540baabf42245189b60b29a9bc799c35f6c4f6205f06c5efe449166cc0791.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
remcos
1.7 Pro
Host
systemcontrol.ddns.net:45000
systemcontrol2.ddns.net:45000
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
OfficeUpgrade.exe
-
copy_folder
OfficeUpgrade
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
Upgrader.dat
-
keylog_flag
false
-
keylog_folder
Upgrader
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
req_khauflaoyr
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screens
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
OfficeUpgrade
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
1e3540baabf42245189b60b29a9bc799c35f6c4f6205f06c5efe449166cc0791
-
Size
139KB
-
MD5
c18ed22232aa0d8b06ddd20fabcea7af
-
SHA1
a4be87e0c083353de36a6c1bd531dbb8a2087f66
-
SHA256
1e3540baabf42245189b60b29a9bc799c35f6c4f6205f06c5efe449166cc0791
-
SHA512
1582a6a57cc8ed4248e4936e0abc9c5bef0a0275c865b20a0f30e84d97faa1088e4ce365bb4361db75fdda6b0d292be1f35c7daa2e8abba5dddd7599aed69f86
-
SSDEEP
3072:xPd4n/M+WLcilrpgGH/GwY87mVmIXhIHVSV:xP6/M+WLckOBhVmIYY
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-