General
-
Target
08012025_1417_NOGHCV09800.bat.zip
-
Size
1.3MB
-
Sample
250108-rr72bawkbr
-
MD5
d3a816dab2a076bb2168ea7560eca13e
-
SHA1
ad2cd39349a4c9adac5a6070b844fb414c323a04
-
SHA256
50d113ca212ad87b6d19e14c12cd91638b8cd4da4c8fc7c020dda0557c93fd85
-
SHA512
dde3682c9760934f45f448c967b9f5d8a3f0163614be2725dd6db2e3812974360d44b234bd3217f586a5c2170bf7d5095eafc4e2a9b8bb786537bb612ea174ae
-
SSDEEP
24576:ma608AJSkLxCf8BMbDLXSqorb/D5NnvFaPitu2+k7gSgX70GOIyAhTm:m13AJSkLq8BMXLXNo/dNnvgaP+k27jOT
Behavioral task
behavioral1
Sample
NOGHCV09800.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
NOGHCV09800.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
remcos
RemoteHost
192.210.150.26:3678
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-UJY4D8
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
NOGHCV09800.bat
-
Size
1.4MB
-
MD5
52213367d8528d5da7e3ed356d80ddc3
-
SHA1
f99fa064f78f516f7b4e6a0167fc54a193cd642d
-
SHA256
17a545082a45c4c219bd09093349cb12cafef84e37a8dd989b6382a434b89544
-
SHA512
a1d4fadf5dbfb32bdc6939b12d0f11c09be991fb1a397d4bfe97db880baf0d8803103be5166993038b79b8ec3f03122c4e44703d7485a6b77bc97c17a777472e
-
SSDEEP
24576:CiUmSB/o5d1ubcvI9/0XhFXSQMJ/ZDfJvXnaPw9Qs287sKeXnusOag6hj3:C/mU/ohubcvIx0xFXtMr7JvXa4x28Knt
-
Remcos family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-