General
-
Target
06363ca6381d7c68f453b58f0566966caa9169c25dea626cfcb7001a3dd7bc5f.zip
-
Size
1.2MB
-
Sample
241122-qhmhks1na1
-
MD5
af1a64f54344ad396c497a049d3fb0d4
-
SHA1
4b021bce6275b69d862a67f0de75070db5a8e09d
-
SHA256
ee4b8bc857624e0cd7e8d5b9356d6a9493c63b573137902a61ff6728bc071d67
-
SHA512
b1e7d5712355f0b1a37ee0ecc7eb8c0f0f067ca79727c52d01b71c106a84ab687213196b0af24368ad699ce95b3a7493aae985d00f38979b420a20644ab96872
-
SSDEEP
24576:N2zYNHMs7aKGXFTOtOaf56d99iVMvsOr8uW3mEE87EW+RFeKw5wQlam0HvBW9apd:N2UNssbiOtOafWYGUO4u5X4+RAza4a3V
Static task
static1
Malware Config
Extracted
remcos
host_one
101.99.94.69:2404
101.99.94.69:8090
101.99.94.69:44444
101.99.94.69:80
101.99.94.69:21
101.99.94.69:4899
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
rmc
-
mouse_option
false
-
mutex
Rmc-UP4CTA
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
06363ca6381d7c68f453b58f0566966caa9169c25dea626cfcb7001a3dd7bc5f.exe
-
Size
1.2MB
-
MD5
5699d5b44379624ebc78078a1b85e18c
-
SHA1
ec5c17b3d75b17ecac13189411c947a2e702d2bf
-
SHA256
06363ca6381d7c68f453b58f0566966caa9169c25dea626cfcb7001a3dd7bc5f
-
SHA512
db80b2bf2fba5ca707c34b3b96b37cc6f1b07d3ea932e8a1cf18dcbd0c14de264dc30b04aa079666aa1f6a37999d78a7b6bc6ba658486f241801e53e3dbe8ab5
-
SSDEEP
24576:xbS0RhM8VtCAsdn3x4K30AHc/nVHwOsG91VT9LcsikZeHoi+oYjqm2Z:VXh5AN3xN30AHc/V6G9n5KaAZpZ
-
Remcos family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Enumerates processes with tasklist
-