General
-
Target
25d7d9203489d28551d949f5a668c55347f34641eed17ef065e4b5884a09a219
-
Size
1016KB
-
Sample
241104-fdw64svbrl
-
MD5
24a14bdfe0da40a53f95fac2665a852e
-
SHA1
4b2dc685634ac35276e19bea3ae329eb4d5576ff
-
SHA256
25d7d9203489d28551d949f5a668c55347f34641eed17ef065e4b5884a09a219
-
SHA512
bddb89e10cb589066c2a2a7db96f9dcbc361e9b7a41d63a869d5dd2fdfe03d21431f961660cf1341ef15b0d1c30550a641a4b94d77014aa4baec560f3cfee33b
-
SSDEEP
24576:9r2yFhWSksulMhSq5fzEmIxdMaXLLAHBZPrANZs8zuJTbeO:9L+St9SEITLAhZP6PybeO
Static task
static1
Behavioral task
behavioral1
Sample
Bunker Notification_pdf.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Bunker Notification_pdf.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
remcos
RemoteHost
154.216.18.214:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-AOD6MB
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
Bunker Notification_pdf.exe
-
Size
1.5MB
-
MD5
5ab91d5300577930a3ec8e2bd897ca33
-
SHA1
a77d800b2c961a9e48e6ddf473a0e0edf09c7cbd
-
SHA256
bbf5e00ee212abad8f3f658e642b896c73f6b6159b1a49a2adb86b7f2f0f46b9
-
SHA512
fb5ff26ee8a4b831978790780f38735f8891de859a325615a9837e26ce60941171f55a45273a8c7b450c16ddfff646783db9b21bd3978af6cb9e56b7144866d5
-
SSDEEP
24576:cAHnh+eWsN3skA4RV1Hom2KXFmIas9tlB8EmOhXMUNhL8HZxhvAN5s8zuzA5:7h+ZkldoPK1Xas/jRFL85xhOvH
Score10/10-
Remcos family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-