General
-
Target
Terms-and-Conditions.bat
-
Size
4KB
-
Sample
250109-r6r9eavjfq
-
MD5
46b5f44de72c0854fea4109c6ccafe13
-
SHA1
60aefbb7723950367f2d3c66697c5dc5c9afbec0
-
SHA256
14da11e85dde95c86a1e1bc6c68b49e6a99f967cb35219c51996f5915d9b62f8
-
SHA512
5792858f8b4dd037639227cac3aecb48bd0fde208d2fdc1573c96cc2783d86dd49fe8aa6a9e04d6f6dc0bf4c8beb362e2816e4ce6130c4ae034a836cde7adb7b
-
SSDEEP
96:9R6Ry59SGQl5PF7NuMDV5H02EIzBj6O7AFdbMAIv8k3ACoRDSDA6AcdAMLASDAZB:D6RyO95PVNzDH02EIzBj6KAFdbMAIv/k
Static task
static1
Behavioral task
behavioral1
Sample
Terms-and-Conditions.bat
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Terms-and-Conditions.bat
Resource
win10v2004-20241007-en
Malware Config
Extracted
remcos
OkX73654Jue
www.hrtgm.com:5977
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
KX73640opWe-WS9CAV
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
Terms-and-Conditions.bat
-
Size
4KB
-
MD5
46b5f44de72c0854fea4109c6ccafe13
-
SHA1
60aefbb7723950367f2d3c66697c5dc5c9afbec0
-
SHA256
14da11e85dde95c86a1e1bc6c68b49e6a99f967cb35219c51996f5915d9b62f8
-
SHA512
5792858f8b4dd037639227cac3aecb48bd0fde208d2fdc1573c96cc2783d86dd49fe8aa6a9e04d6f6dc0bf4c8beb362e2816e4ce6130c4ae034a836cde7adb7b
-
SSDEEP
96:9R6Ry59SGQl5PF7NuMDV5H02EIzBj6O7AFdbMAIv8k3ACoRDSDA6AcdAMLASDAZB:D6RyO95PVNzDH02EIzBj6KAFdbMAIv/k
-
Remcos family
-
Blocklisted process makes network request
-
Adds Run key to start application
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-