General
-
Target
04122024_1416_awb_shipping_documents_bl_inv_2024_12_04_000000000000000.cmd.zip
-
Size
4KB
-
Sample
241204-rrw9taxrfx
-
MD5
e87c78bd5ff7420db2d0474f0e7b8f13
-
SHA1
7059c136c8bcecf9b9a3b1acb11086242023bc25
-
SHA256
caa4eddbc202ba6e4978e3c2c5991b886e675c91006148aa45e5ffba0605b155
-
SHA512
7a0c3e7eadac54b1941645868ecca399ac93b5f442ea0e5258baec6d1ae0ed5efc2455a8364a2cb40303714d787e46c015d0b68b95616e214d5d44bf2310c095
-
SSDEEP
96:yfzhjcCvqlmg0jZBo4FlhRheugIP5HgLCxr9/ul:yfzh/FvoWRhe8Rn/ul
Static task
static1
Behavioral task
behavioral1
Sample
awb_shipping_documents_bl_inv_2024_12_04_000000000000000.cmd
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
awb_shipping_documents_bl_inv_2024_12_04_000000000000000.cmd
Resource
win10v2004-20241007-en
Malware Config
Extracted
remcos
New
janout21oadsts1.duckdns.org:57484
janout21oadsts1.duckdns.org:57483
janout21oadsts2.duckdns.org:57484
janout21oadsts3.duckdns.org:57484
janout21oadsts4.duckdns.org:57484
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
amaonspt.dat
-
keylog_flag
false
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
lmoijuetgtso-X0FCJD
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
- startup_value
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
awb_shipping_documents_bl_inv_2024_12_04_000000000000000.cmd
-
Size
7KB
-
MD5
12ee31039816c33d31fb9dad778fe576
-
SHA1
c1959d46a3384851398249cef3e27e5d0296f884
-
SHA256
b1b8e1093c838012c779d0f80fff877ef269072b8807d53906e0c0aef343f9e4
-
SHA512
95780e880506d8974ca70a683bd941c0c7d783d02b319760a7cd692c4526da9e82f5f21fa86d183d316dec4acef9c9a9c15f73695b9072774631d62ce5e1ddb8
-
SSDEEP
96:zSqPH/nDhhlCkBx+/h8l4GwKga/BKvv1XrxKEXv5+SqapBF/H1n9pas:DHrhhlTv+p8l4GoYM31NKEXwapV90s
-
Remcos family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Blocklisted process makes network request
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-