General
-
Target
950a5130cc8ca680304c24e5294b9b5303883ce46a2894f23f01ddb39da7fb71
-
Size
507KB
-
Sample
250115-da1n1syjcw
-
MD5
a29cd274aa5649b2252c50e171a5aa48
-
SHA1
2144a837edcf1ebe89ca7a7920a724ce55b8e722
-
SHA256
950a5130cc8ca680304c24e5294b9b5303883ce46a2894f23f01ddb39da7fb71
-
SHA512
349ec2d09f503647fee8ae12502057342c7aa2e0a91489554af834d4d6fdad6ff122bdd95b0aaa1122d752afa1f6b0ffa4f25c316d88419833844aba0db01824
-
SSDEEP
12288:Hpt08EfVRc7RWf3EdrjxexNkSccFwanRWU8NuT:v0ZfPcVc3EtGFwOwuT
Static task
static1
Behavioral task
behavioral1
Sample
Awb_Shipping_confirmation_doc_010720257820020031808174CN18003010142025.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Awb_Shipping_confirmation_doc_010720257820020031808174CN18003010142025.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Malware Config
Extracted
remcos
Manifest
linktreewealth.zapto.org:3980
linktreewealth.zapto.org:3981
linktreewealthy.zapto.org:3980
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-0B1XIG
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Extracted
latentbot
linktreewealth.zapto.org
linktreewealthy.zapto.org
Targets
-
-
Target
Awb_Shipping_confirmation_doc_010720257820020031808174CN18003010142025.bat
-
Size
595KB
-
MD5
dd009056ed546d7cb3b75ef74f748ced
-
SHA1
39fa6f07ceaf1d545c02702a18dcacc5c57acf0a
-
SHA256
bfe72721ad2c670966f0d1a30af60b5d697731c31afdd028ee316d32ab2e4e17
-
SHA512
e93e2802c0b8dab4a384bfdb5d54191438e21d1c7f0228c6f92b0382562d9948869f4ef4610d595e8775556197e4ae68f3e9dc35d6e82495cbc8976655a5ab2b
-
SSDEEP
12288:UnPdM9EEXsp0807Vhc7PWf/EdNjxwxNkecc9waDhWC8muW:EPdM20/77cbc/Ezs9wgtuW
-
Guloader family
-
Latentbot family
-
Remcos family
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
12KB
-
MD5
4add245d4ba34b04f213409bfe504c07
-
SHA1
ef756d6581d70e87d58cc4982e3f4d18e0ea5b09
-
SHA256
9111099efe9d5c9b391dc132b2faf0a3851a760d4106d5368e30ac744eb42706
-
SHA512
1bd260cabe5ea3cefbbc675162f30092ab157893510f45a1b571489e03ebb2903c55f64f89812754d3fe03c8f10012b8078d1261a7e73ac1f87c82f714bce03d
-
SSDEEP
192:VjHcQ0qWTlt7wi5Aj/lM0sEWD/wtYbBjpNQybC7y+XZv0QPi:B/Qlt7wiij/lMRv/9V4bvr
Score3/10 -
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1