General
-
Target
files.zip
-
Size
1.5MB
-
Sample
241204-1mw8paymcl
-
MD5
7dda6a970598315b647c5da4eb99c293
-
SHA1
e108910741552010cd6e9480be1187388cf98aa2
-
SHA256
4ba50be2c056423d1788cc6f2e7e1444e069684c14a302d1486725bc736d30c3
-
SHA512
94f8c3b513cea50ce768585fa6c70f7164fb41b11e77e4aae7ace9555585e54fa56ce4e997b52c52694dc4ed3e8c106ea26cf4743974da980205799e57aa1ae3
-
SSDEEP
24576:89g8XU+VMdSlAbiyGYYr8T4FtGMidZ2T06cl/2ZWnst+/asNpb/WE5pjXOEKwWzW:8q8XU+uSlo0LHSQT0pl/2ZWo+CcRvPHp
Static task
static1
Behavioral task
behavioral1
Sample
GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_84_1_0.crx
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_84_1_0.crx
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
PCESTHTB.msi
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
PCESTHTB.msi
Resource
win11-20241007-en
Malware Config
Extracted
remcos
HotLine
itadmincentral.com:443
itadmincentral.com:8080
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
35
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
putty
-
mouse_option
false
-
mutex
htl-TQFCUW
-
screenshot_crypt
false
-
screenshot_flag
true
-
screenshot_folder
Putty
-
screenshot_path
%AppData%
-
screenshot_time
1
- startup_value
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
notepad;chrome;edge;
Targets
-
-
Target
GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_84_1_0.crx
-
Size
135KB
-
MD5
3f6f93c3dccd4a91c4eb25c7f6feb1c1
-
SHA1
9b73f46adfa1f4464929b408407e73d4535c6827
-
SHA256
19f05352cb4c6e231c1c000b6c8b7e9edcc1e8082caf46fff16b239d32aa7c9e
-
SHA512
d488fa67e3a29d0147e9eaf2eabc74d9a255f8470cf79a4aea60e3b3b5e48a3fcbc4fc3e9ce58dff8d7d0caa8ae749295f221e1fe1ba5d20deb2d97544a12ba4
-
SSDEEP
3072:AQ++ZdS5+fnwcxO+XwquyeNnmraugZ/1DOoncWD/5q:AQ++/PZmlyeNnh/1SmRq
Score4/10 -
-
-
Target
PCESTHTB.msi
-
Size
1.4MB
-
MD5
d5dd7c58c554c36c64ca86e6c172a3bb
-
SHA1
2401fff28f1208e3da5b44a528a6f6ece9fc25ac
-
SHA256
2dcafda9801e9cabf05f5824dc196f5fb966d53b5261207c7ea305bcc813aa2b
-
SHA512
d7f22b2e50ce9c603ea90be4f06e6e451414db6b0119907aaea0e2fd3f9ca6edb6a758dec659e03153fb17b4bbadc74b4100db35737d29b09d189f9b357ddfad
-
SSDEEP
24576:SHbU+DclSpAbi8cYeruT4HLGqidTsDo64N7im+o/gnWnsZ+/acJpDFWO5pjVOoKZ:AbU+mSpe2hfS4DoVN2m+o/gnWA+COZzr
-
Remcos family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Accesses Microsoft Outlook accounts
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Installer Packages
1Modify Authentication Process
1Defense Evasion
Modify Authentication Process
1System Binary Proxy Execution
1Msiexec
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1