General
-
Target
Confirmation_028387373736_Copies_6761fa19c0f9d_293874738_IMG__REF2632737463773364_221.xxe
-
Size
1.6MB
-
Sample
250115-awbp8svjfs
-
MD5
6bb9c9b3f217dfc2821ac7b12a895920
-
SHA1
7d92a9db1d5f6d54812d512b43c45e701a9cbe2a
-
SHA256
f93d52716a1d0e4d9ad8f1d745f0dc9126bad19fac21b78502e621ba1a6ed7f7
-
SHA512
f53486a8ec65d194628df8240ab2d03c0132a979cb5374cdcd37b54be3222e7550f26b8a315bc783d1c949120b1ac4204f07cbd80abb254e127c26388baef93f
-
SSDEEP
24576:4Q5Z66OhH2Kk8zoIdqrtJj8rbH5eH/3lXRioVZ3vMDPtO:B5Z66Oh/70VJj2YXRte0
Static task
static1
Behavioral task
behavioral1
Sample
Confirmation_028387373736_Copies_6761fa19c0f9d_293874738_IMG__REF2632737463773364_221.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Confirmation_028387373736_Copies_6761fa19c0f9d_293874738_IMG__REF2632737463773364_221.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
remcos
UPDATEIP
suregigg2.redirectme.net:4689
suregigg2.redirectme.net:4688
oaziamaka.duckdns.org:4688
oaziamaka.duckdns.org:4689
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
aleopty.dat
-
keylog_flag
false
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
deokwensgb-XP0DHK
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
- startup_value
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
Confirmation_028387373736_Copies_6761fa19c0f9d_293874738_IMG__REF2632737463773364_221.exe
-
Size
1.2MB
-
MD5
14950122eb9408da25415925f2d640c1
-
SHA1
a0a700a23a76d1a74e4bfeea70285b031e4632a5
-
SHA256
bab2fe1464095154de3715f90f92351a3f462bebac4d6a7dd52bc1411c6964cc
-
SHA512
fe514613a05a531588a186ee2caf4438a263e10689d509cc8bfba8b5aecce72c2f7bc065a2a2599e9612080ad27c6907d24fe263fe105d48f111fb1e3252614c
-
SSDEEP
24576:msyGmpFPxXbdq3hwbS5nrm9utI2SnS4ZxE:msy/pF9AAKq8MZxE
-
Remcos family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Blocklisted process makes network request
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-