General
-
Target
yiivdk.exe
-
Size
1.3MB
-
Sample
241203-nvf58atnds
-
MD5
22ee58313edbd477e6a1ed76a1f9218f
-
SHA1
f22e39af8b06e1c471138c820e59bb2abcb15a01
-
SHA256
b54acfe94e3126a7a74935f4482e36513b3e6933af09a69a15dba8a7f4db4458
-
SHA512
12c5ccb66a32a666c2a375ca74d02b10e19b872087738739d58d43c81dd00685b3731888e5b375b398a381e7aa82c25066fff430850caa38a9af5736833ffa01
-
SSDEEP
24576:C2YbBZNbCLvA8pHmGguYNBcR80G9Ps6IZWtu7vSvmgJC9KicB7yd:C2YbBZNuDtm1uKBE80G9bIYtu7qmgJCQ
Static task
static1
Behavioral task
behavioral1
Sample
yiivdk.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
yiivdk.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
remcos
RemoteHost
41.216.183.218:56792
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-I5RS8V
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
yiivdk.exe
-
Size
1.3MB
-
MD5
22ee58313edbd477e6a1ed76a1f9218f
-
SHA1
f22e39af8b06e1c471138c820e59bb2abcb15a01
-
SHA256
b54acfe94e3126a7a74935f4482e36513b3e6933af09a69a15dba8a7f4db4458
-
SHA512
12c5ccb66a32a666c2a375ca74d02b10e19b872087738739d58d43c81dd00685b3731888e5b375b398a381e7aa82c25066fff430850caa38a9af5736833ffa01
-
SSDEEP
24576:C2YbBZNbCLvA8pHmGguYNBcR80G9Ps6IZWtu7vSvmgJC9KicB7yd:C2YbBZNuDtm1uKBE80G9bIYtu7qmgJCQ
-
Remcos family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Drops startup file
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-