General
-
Target
d3307a065f67a642d7425c6b9774b6a145a786d64997b977deb151c03e0caf7e.vbs
-
Size
150KB
-
Sample
241210-d5f8vssnat
-
MD5
8c5cf018a9128cb2a9267ee3c4183a0c
-
SHA1
c0e11113ae0360e55302ceecbc7a356ed732ca18
-
SHA256
d3307a065f67a642d7425c6b9774b6a145a786d64997b977deb151c03e0caf7e
-
SHA512
7a826b11dc1fb0ca727ac5044a620b3db4108994bb4cdd353abfa6abdb9e598523d560a191fb1e42473c803a628f7052914d1c9124f09bbfe5fcdbf6154e5ada
-
SSDEEP
3072:NqHoOtSIAMD8oV8luoi9TKq/do5DvqHoOtSIAMD8oV8luoi9TKq/do50qHoOtSI2:NqpTD8LRiJKq/e57qpTD8LRiJKq/e50x
Static task
static1
Behavioral task
behavioral1
Sample
d3307a065f67a642d7425c6b9774b6a145a786d64997b977deb151c03e0caf7e.vbs
Resource
win7-20240708-en
Malware Config
Extracted
https://res.cloudinary.com/dytflt61n/image/upload/v1733134947/bklpyseyeut4impw50n1.jpg
https://res.cloudinary.com/dytflt61n/image/upload/v1733134947/bklpyseyeut4impw50n1.jpg
Extracted
remcos
NEW
rem.pushswroller.eu:23101
firewarzone.ydns.eu:23101
sun.drillmmcsnk.eu:23101
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmcghghyrtssxr-7RL1P2
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
d3307a065f67a642d7425c6b9774b6a145a786d64997b977deb151c03e0caf7e.vbs
-
Size
150KB
-
MD5
8c5cf018a9128cb2a9267ee3c4183a0c
-
SHA1
c0e11113ae0360e55302ceecbc7a356ed732ca18
-
SHA256
d3307a065f67a642d7425c6b9774b6a145a786d64997b977deb151c03e0caf7e
-
SHA512
7a826b11dc1fb0ca727ac5044a620b3db4108994bb4cdd353abfa6abdb9e598523d560a191fb1e42473c803a628f7052914d1c9124f09bbfe5fcdbf6154e5ada
-
SSDEEP
3072:NqHoOtSIAMD8oV8luoi9TKq/do5DvqHoOtSIAMD8oV8luoi9TKq/do50qHoOtSI2:NqpTD8LRiJKq/e57qpTD8LRiJKq/e50x
-
Remcos family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-