General
-
Target
bf42ad55deadc696f8334e74830fa436d3dd94a7babf200e82a37efc89db510b.iso
-
Size
1.3MB
-
Sample
241112-pm75ea1qbs
-
MD5
5ec98067a25c5cc69b26058f57dc8fc3
-
SHA1
e5666a8876c16eb23732fe635efcb4289461529f
-
SHA256
bf42ad55deadc696f8334e74830fa436d3dd94a7babf200e82a37efc89db510b
-
SHA512
9adb89d8a510549bfc9c8292a1c97e226b6fa1de830c87d18b7e01f2a6ae7e1f517f772b6e5c452eb15bab2d6876c40a39545c91cc26eb6de8fcfb0d0d0a3ec0
-
SSDEEP
12288:idchmgIbgIOgLo24WLXAgQRul9McfhyFGTa4/aCU23oOS9G6CAKYo:idMggZgLo24aaR9cfhyFGaw6CAe
Static task
static1
Behavioral task
behavioral1
Sample
Intesa.Sanpaolo.Pagamento.pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Intesa.Sanpaolo.Pagamento.pdf.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
remcos
RemoteHost
204.10.160.239:9682
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-6D4L9S
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
Intesa.Sanpaolo.Pagamento.pdf.exe
-
Size
1.2MB
-
MD5
c8bc49ed133c2b4040fb1b9aca585fd6
-
SHA1
f646a168db0c6cb3ee2949c2d0770a82dbef4b6d
-
SHA256
84d5e09f1dec559db8fe63f3f9f9d2fab52963d9aba8d0f590d266fb7da6b30d
-
SHA512
d8c4a9efbd31e45443d96b00dd9364100e69fd930a7b86f89da0c782a013521827be1fa59a587f6915f5e15bbba8c84a5fd9fa57de247a5b0ef4513683da1a20
-
SSDEEP
12288:kdchmgIbgIOgLo24WLXAgQRul9McfhyFGTa4/aCU23oOS9G6CAKYo:kdMggZgLo24aaR9cfhyFGaw6CAe
Score10/10-
Remcos family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Drops startup file
-
Suspicious use of SetThreadContext
-