General
-
Target
1.rar
-
Size
884KB
-
Sample
241126-laxlcs1nhj
-
MD5
1af1841cefa112b90495ee90a2bd4951
-
SHA1
ea62169bd4dfa6b22ce42777d4b3cd80b84458dc
-
SHA256
88d5cdd67e82686fc4a606bfaa71ec2a42451a58e3150414adfeb71f538caf88
-
SHA512
69b150fbae5b76d6045bd09e6d627b75dce874978d7b50e2321d8ace07c4ffb1a639397b0c0b3444708591a062be275b54cbc3fde561b29e1430b10970ae4e67
-
SSDEEP
24576:lPGeKoRUQ8+NopjNrzQYlVFqJhJLNk2cq0h6xghVM:FGeKoRSL5NrDl6JhPfpdgk
Static task
static1
Behavioral task
behavioral1
Sample
order PO#001498.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
order PO#001498.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
remcos
RemoteHost
ttalko.duckdns.org:59033
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-BEXAT2
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
order PO#001498.exe
-
Size
963KB
-
MD5
39daebf4d9be61e68ebd944ef63f7742
-
SHA1
6e2258c94edf37b96664b3a1ff35e567df95474b
-
SHA256
dd9ca58955222693e3411c828fb31e266c23d3da6edbe1eefcb069dfd0385781
-
SHA512
1b41deac17446d8bbcdb08dec75f31acc84bfba8afdf49d08aedee9fd07d7cf6a5695b53b411fcbe6be7d69b50a7add8877be71f2cb91cc9b16bf6896436a536
-
SSDEEP
24576:3CZCt4/yGC4wpoj7XFr4d/cLvYa/l+yY/UgCcSSIwjA:yZCttGC4wpojxEd/c3/VYRJSWj
Score10/10-
Remcos family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-