General
-
Target
Terms-and-Condition.bat
-
Size
4KB
-
Sample
241218-y1cebszpcz
-
MD5
f4558513a6b43a0c642449a5ce6eab7e
-
SHA1
cca4c3cf262154b5e80b14534b6b71af32850c52
-
SHA256
c3cf8f1785584a2b30097bc9917f260b397cc3bb5bc2bca54f9f4465ce2a3e0f
-
SHA512
6b34a6892f948d43abf212f4720f8a5d2aad8ad490ef6e262997fd6d5df6e51f99e60b7888673349b8d717afe7c9805966d126ec9c80b8e6c154fdd505eb4fbf
-
SSDEEP
96:9R6Ry59SGQl5PF7NuMDV5H02EIzBj6O7AFdbMAIv8k3ACoRDSDA6AcdAMLASDAZZ:D6RyO95PVNzDH02EIzBj6KAFdbMAIv/m
Static task
static1
Behavioral task
behavioral1
Sample
Terms-and-Condition.bat
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Terms-and-Condition.bat
Resource
win10v2004-20241007-en
Malware Config
Extracted
remcos
OkX73654Jue
www.hrtgm.com:5977
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
KX73640opWe-WS9CAV
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
Terms-and-Condition.bat
-
Size
4KB
-
MD5
f4558513a6b43a0c642449a5ce6eab7e
-
SHA1
cca4c3cf262154b5e80b14534b6b71af32850c52
-
SHA256
c3cf8f1785584a2b30097bc9917f260b397cc3bb5bc2bca54f9f4465ce2a3e0f
-
SHA512
6b34a6892f948d43abf212f4720f8a5d2aad8ad490ef6e262997fd6d5df6e51f99e60b7888673349b8d717afe7c9805966d126ec9c80b8e6c154fdd505eb4fbf
-
SSDEEP
96:9R6Ry59SGQl5PF7NuMDV5H02EIzBj6O7AFdbMAIv8k3ACoRDSDA6AcdAMLASDAZZ:D6RyO95PVNzDH02EIzBj6KAFdbMAIv/m
-
Remcos family
-
Blocklisted process makes network request
-
Adds Run key to start application
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-