General
-
Target
JaffaCakes118_ea7b951cd02856e10eb2316f141c5107
-
Size
1.0MB
-
Sample
250110-wjxb3atngj
-
MD5
ea7b951cd02856e10eb2316f141c5107
-
SHA1
5700aeb775258508491cd7bc735adaee26da67be
-
SHA256
ca9e376c93bcc57e658566cdb0b0f68d6417a6e6e69705f5c9fa883d5c82282f
-
SHA512
570bacaf2e398f31736936350542151cd3cd5e785de5d3a750ceab2ac455b50c22af85042496a846bb18224257fbd7b7b4c02800a04638da0fee1d84415fd15c
-
SSDEEP
12288:FthatZrYWF1dLSBr7QlU2+BbkB1/L8R4jGjeEPMIthO/W1Ad9S2NVvz6Sgq7qrcc:Ft8tuWFOBrc62is8iKXOSQTEcAS
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_ea7b951cd02856e10eb2316f141c5107.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_ea7b951cd02856e10eb2316f141c5107.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
remcos
1.7 Pro
Host
gdyhjjdhbvxgsfe.gotdns.ch:1996
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
fsd.exe
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
remcos_lrqrjhqsyqtzudh
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screens
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
ioa
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
JaffaCakes118_ea7b951cd02856e10eb2316f141c5107
-
Size
1.0MB
-
MD5
ea7b951cd02856e10eb2316f141c5107
-
SHA1
5700aeb775258508491cd7bc735adaee26da67be
-
SHA256
ca9e376c93bcc57e658566cdb0b0f68d6417a6e6e69705f5c9fa883d5c82282f
-
SHA512
570bacaf2e398f31736936350542151cd3cd5e785de5d3a750ceab2ac455b50c22af85042496a846bb18224257fbd7b7b4c02800a04638da0fee1d84415fd15c
-
SSDEEP
12288:FthatZrYWF1dLSBr7QlU2+BbkB1/L8R4jGjeEPMIthO/W1Ad9S2NVvz6Sgq7qrcc:Ft8tuWFOBrc62is8iKXOSQTEcAS
Score10/10-
Remcos family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1