General
-
Target
a0ecdaae177a7771ee1538cdfa25d54958f12d3588961c0de00dffebe5399c1b
-
Size
818KB
-
Sample
241104-xxb4qayjaq
-
MD5
2d68879c5c698a39be4e009620e28a05
-
SHA1
f625d393b3a4fbe198056cc01138f0a49c869009
-
SHA256
a0ecdaae177a7771ee1538cdfa25d54958f12d3588961c0de00dffebe5399c1b
-
SHA512
fdab144d764690498475b22d10a8cce62ed073dbd85be57fde224b98aad8fcc962776a7c9829f677eb53239d5d338486b65b0b4418d4ac32d4529246f0ee71be
-
SSDEEP
12288:WR222Man2/H5OsFVmPjQUydb1EDo7uQ2XJCw5TO2P5UCLqaLf7kweDI+20U:/22EY+mPjnyJ1EDo7bIJnTzWLqS20U
Static task
static1
Behavioral task
behavioral1
Sample
a0ecdaae177a7771ee1538cdfa25d54958f12d3588961c0de00dffebe5399c1b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a0ecdaae177a7771ee1538cdfa25d54958f12d3588961c0de00dffebe5399c1b.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Malware Config
Extracted
remcos
RemoteHost
myfreeenedd.ru:2404
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-JHR97Z
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
a0ecdaae177a7771ee1538cdfa25d54958f12d3588961c0de00dffebe5399c1b
-
Size
818KB
-
MD5
2d68879c5c698a39be4e009620e28a05
-
SHA1
f625d393b3a4fbe198056cc01138f0a49c869009
-
SHA256
a0ecdaae177a7771ee1538cdfa25d54958f12d3588961c0de00dffebe5399c1b
-
SHA512
fdab144d764690498475b22d10a8cce62ed073dbd85be57fde224b98aad8fcc962776a7c9829f677eb53239d5d338486b65b0b4418d4ac32d4529246f0ee71be
-
SSDEEP
12288:WR222Man2/H5OsFVmPjQUydb1EDo7uQ2XJCw5TO2P5UCLqaLf7kweDI+20U:/22EY+mPjnyJ1EDo7bIJnTzWLqS20U
Score10/10-
Remcos family
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
3e6bf00b3ac976122f982ae2aadb1c51
-
SHA1
caab188f7fdc84d3fdcb2922edeeb5ed576bd31d
-
SHA256
4ff9b2678d698677c5d9732678f9cf53f17290e09d053691aac4cc6e6f595cbe
-
SHA512
1286f05e6a7e6b691f6e479638e7179897598e171b52eb3a3dc0e830415251069d29416b6d1ffc6d7dce8da5625e1479be06db9b7179e7776659c5c1ad6aa706
-
SSDEEP
192:eP24sihno00Wfl97nH6T2enXwWobpWBTU4VtHT7dmN35OlbSl:T8QIl975eXqlWBrz7YLOlb
Score3/10 -
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1