General
-
Target
8366f77c935b2e69de39caac11507cc0ad2ac8eba6ebd70fa04c65b99b19225f
-
Size
1.4MB
-
Sample
241112-chvbjasdll
-
MD5
f9bef83f75870b44ef947e5d71ab229f
-
SHA1
e93947c9f7209167c09f292430ab25ed06e75afd
-
SHA256
8366f77c935b2e69de39caac11507cc0ad2ac8eba6ebd70fa04c65b99b19225f
-
SHA512
b65851724317a291c2b52ab5856b8dc51a85f51358657ff4df27bb70238402177669ded0a699322a550dac7c403d06bd8519602e5189772eec802e28872706db
-
SSDEEP
24576:JzFh6Ax5KkdYBl9fKMsIE25rHySpgb9ivdjd+gmqSTudy2sKZQbXcD6dKJeQSom6:RFh6MKkWtfKbT4jWivLjsKkdKD7m+R7
Static task
static1
Behavioral task
behavioral1
Sample
PO -96778097 HHIC 137 IMO 9730086-HYU24111103-프로젝트 순서.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
PO -96778097 HHIC 137 IMO 9730086-HYU24111103-프로젝트 순서.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
remcos
RemoteHost
162.251.122.86:6644
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-CGA6IQ
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
PO -96778097 HHIC 137 IMO 9730086-HYU24111103-프로젝트 순서.exe
-
Size
1.7MB
-
MD5
4302ff3ce4d3f174a2a6f6b4d6bbef32
-
SHA1
3039a7ebfc83cc920790ca4ee7d18a0b332437ed
-
SHA256
8082ea9624bb02dd681c092c1fbddf363c145b8a633441dde6170e7eb151d8ef
-
SHA512
228fe4cdd9f49da7830a4266737f7b16b666c08f3e01ab09a8e7934864d25142c2691e9360efced6787900693429970faa44b3c065104104101e3b9b792940fe
-
SSDEEP
49152:7JZoQrbTFZY1iaCtkWTTglQ4v5Hs2ydsx/wwRW:7trbTA1ik7v5HDRW
-
Remcos family
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-