General
-
Target
3e6b2955e8e0ddd77f3886b9727ea7a38657d4f0af47130559a8cefe1c87ea97.exe
-
Size
701KB
-
Sample
241109-czgf1avkat
-
MD5
74436e65e2a2612fb6a127990d81f44d
-
SHA1
d3fb7c67c6441d908a91d6e6b86e38c85b47b877
-
SHA256
3e6b2955e8e0ddd77f3886b9727ea7a38657d4f0af47130559a8cefe1c87ea97
-
SHA512
bbd6102c6759d61cb701cf235e2bfea442cfd702ad9def2e4d5134259678ecc0f79488e66d9e7bdfa39ae621f25ed5c68ccc21a298ddb5df497bd72070c0d491
-
SSDEEP
12288:4Mwd9MAsZuwxTSesxl98vQJXQNqlSFQkuizwFFRNkpXmGzEk/in5IAvmtnRHPG62:4Mwd9MAgSBP84JeqlSFQdimvkm2t/6kY
Static task
static1
Behavioral task
behavioral1
Sample
3e6b2955e8e0ddd77f3886b9727ea7a38657d4f0af47130559a8cefe1c87ea97.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3e6b2955e8e0ddd77f3886b9727ea7a38657d4f0af47130559a8cefe1c87ea97.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Militrattacheens/boliganvisning.app
Resource
macos-20241106-en
Malware Config
Extracted
remcos
eda bro
185.150.191.117:4609
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-CK59IO
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
3e6b2955e8e0ddd77f3886b9727ea7a38657d4f0af47130559a8cefe1c87ea97.exe
-
Size
701KB
-
MD5
74436e65e2a2612fb6a127990d81f44d
-
SHA1
d3fb7c67c6441d908a91d6e6b86e38c85b47b877
-
SHA256
3e6b2955e8e0ddd77f3886b9727ea7a38657d4f0af47130559a8cefe1c87ea97
-
SHA512
bbd6102c6759d61cb701cf235e2bfea442cfd702ad9def2e4d5134259678ecc0f79488e66d9e7bdfa39ae621f25ed5c68ccc21a298ddb5df497bd72070c0d491
-
SSDEEP
12288:4Mwd9MAsZuwxTSesxl98vQJXQNqlSFQkuizwFFRNkpXmGzEk/in5IAvmtnRHPG62:4Mwd9MAgSBP84JeqlSFQdimvkm2t/6kY
-
Remcos family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
-
-
Target
Militrattacheens/boliganvisning.app
-
Size
424KB
-
MD5
a254d81b4f25bc2b7d74ed5ac8ef3877
-
SHA1
2098fcd61a958c772e7eedd5bb736deac2f0bd39
-
SHA256
f45da7c81581e6c3f3211fb431a8259d2c05fa60635f4e1c764584467b71ebb4
-
SHA512
5cb1f8672197da9cf3b4461cc470bdb0e3e4965eb6d3c7170168a4af3d00ec23a1474281766f790fcc6fc577fccf89971a5addec5c1f220f618c6887ec6607e3
-
SSDEEP
1536:Y2dHtzRzGpErAfmh6tyfeCOfrCmf3XRWxYgT0Gcu:Y2tpGpEMfhwGj9xWmu
Score1/10 -