General
-
Target
777c342842ebb22a72ce1d893c4ed78637911578c7b3593893effbc12ef5600f
-
Size
1.9MB
-
Sample
241106-148m2s1nak
-
MD5
219fa77e56365fdef1af982fb1f9e2e9
-
SHA1
107f89372bafa6359d6c3149046e203352485874
-
SHA256
777c342842ebb22a72ce1d893c4ed78637911578c7b3593893effbc12ef5600f
-
SHA512
4e79442273ab0deeae00a52c66e689dee3eaf9243492ee11ef167cb1208f1fc1a7fb7eaed2c62efb7a79f0bcabc29c829d8717a58cbc78abd4762e520b505b81
-
SSDEEP
49152:zuKR34gS20bwlIhMilvtgLe+w0KGORLxgAkdox:kgSL8lIhpWIpGORLNrx
Static task
static1
Behavioral task
behavioral1
Sample
PO-11880-SP08576-Order-11-2024.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PO-11880-SP08576-Order-11-2024.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
remcos
RemoteHost
162.251.122.86:6644
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-CGA6IQ
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
PO-11880-SP08576-Order-11-2024.exe
-
Size
3.5MB
-
MD5
60289b63285b0b7bab457e729c2f1b87
-
SHA1
b20e0bc2518a49d1d5f7f9c843c0e602fd0225a7
-
SHA256
3042322397ce6625019ea77b84a74d44053fd0ea292872acb9edee7a3d42f467
-
SHA512
03e7ea04cf7319915fe28c3d89fdfb4be757fb1951556e895a043a313bbd4a87e785952641587c23480b7d6aa3dcdf37ef1093fd368f9821cc0aa289cfd01ccf
-
SSDEEP
49152:2uOFJogSS0pwVgdiGPZtiLA+cgumORxPkAqjkD:ZgSX6Vgdb+C7mORxrtD
-
Remcos family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
4Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1