General
-
Target
4e66fdbc38893f545b9088331861312e46e612bc9f4f96a9c88b286588680bf9.vbs
-
Size
167KB
-
Sample
241218-czbkrazqcn
-
MD5
3c217b6a70e1ff5e6ecb71ca0e89644a
-
SHA1
d158bcee429368797c22f4c2f9a305c2ff37beae
-
SHA256
4e66fdbc38893f545b9088331861312e46e612bc9f4f96a9c88b286588680bf9
-
SHA512
38bb4918e229bb83c0f7f4f3ca086253f22197f44887f81dbe4aad019811b91799bc9206155c99906855372cdc0eb09f778913d8d2b59423c3b5e550585672db
-
SSDEEP
1536:groJZFpjN3Z5cpeYTXOnBodK/fI81ltCwKoAVTmT2xc1k3TjSjjXuw7dk+aojwE3:grorj9Z5ccYKKIIyScjXx7dk+aojD
Static task
static1
Behavioral task
behavioral1
Sample
4e66fdbc38893f545b9088331861312e46e612bc9f4f96a9c88b286588680bf9.vbs
Resource
win7-20241023-en
Malware Config
Extracted
https://res.cloudinary.com/dzvai86uh/image/upload/v1734315244/m3gtbqktvnocyvm410aa.jpg
https://res.cloudinary.com/dzvai86uh/image/upload/v1734315244/m3gtbqktvnocyvm410aa.jpg
Extracted
remcos
NEW
rem.pushswroller.eu:23101
firewarzone.ydns.eu:23101
sun.drillmmcsnk.eu:23101
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmcghghyrtssxr-7RL1P2
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
4e66fdbc38893f545b9088331861312e46e612bc9f4f96a9c88b286588680bf9.vbs
-
Size
167KB
-
MD5
3c217b6a70e1ff5e6ecb71ca0e89644a
-
SHA1
d158bcee429368797c22f4c2f9a305c2ff37beae
-
SHA256
4e66fdbc38893f545b9088331861312e46e612bc9f4f96a9c88b286588680bf9
-
SHA512
38bb4918e229bb83c0f7f4f3ca086253f22197f44887f81dbe4aad019811b91799bc9206155c99906855372cdc0eb09f778913d8d2b59423c3b5e550585672db
-
SSDEEP
1536:groJZFpjN3Z5cpeYTXOnBodK/fI81ltCwKoAVTmT2xc1k3TjSjjXuw7dk+aojwE3:grorj9Z5ccYKKIIyScjXx7dk+aojD
-
Remcos family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-