General
-
Target
1afaba7255b072d5b5459d784a332cefe16f39b880ae5544f546cb95f1220dca
-
Size
1.1MB
-
Sample
241126-za62pavmbj
-
MD5
be53f22f667f5cad38dfdc078260b795
-
SHA1
2c71d39f61d00a0c2e73c6221c6a5e9ec8fdbd01
-
SHA256
1afaba7255b072d5b5459d784a332cefe16f39b880ae5544f546cb95f1220dca
-
SHA512
3b5664e3983833608c316576270787b9ba7ebf6cc6f5640719e7b6a9ba4aafd4f9352a89ddd473dbf4a0cb467fe2e57676dfb784dcf7c10fab02ac35f38acc94
-
SSDEEP
24576:OeXB1m0LifI3DB8nv4Ieje3ZMLyHZIA4Nm5EDCIc78cO4:Oo1m0L+RwHjkUfAum5EDCTgc
Static task
static1
Behavioral task
behavioral1
Sample
1afaba7255b072d5b5459d784a332cefe16f39b880ae5544f546cb95f1220dca.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1afaba7255b072d5b5459d784a332cefe16f39b880ae5544f546cb95f1220dca.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
remcos
RemoteHost
172.93.189.76:2404
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
true
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-4EQLNI
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
- startup_value
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
1afaba7255b072d5b5459d784a332cefe16f39b880ae5544f546cb95f1220dca
-
Size
1.1MB
-
MD5
be53f22f667f5cad38dfdc078260b795
-
SHA1
2c71d39f61d00a0c2e73c6221c6a5e9ec8fdbd01
-
SHA256
1afaba7255b072d5b5459d784a332cefe16f39b880ae5544f546cb95f1220dca
-
SHA512
3b5664e3983833608c316576270787b9ba7ebf6cc6f5640719e7b6a9ba4aafd4f9352a89ddd473dbf4a0cb467fe2e57676dfb784dcf7c10fab02ac35f38acc94
-
SSDEEP
24576:OeXB1m0LifI3DB8nv4Ieje3ZMLyHZIA4Nm5EDCIc78cO4:Oo1m0L+RwHjkUfAum5EDCTgc
-
Remcos family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1