General
-
Target
formulario_agendamiento_citas.msi 4
-
Size
5.1MB
-
Sample
250117-xk71mazkhs
-
MD5
b0b0ce5887fe4e050976eb7b6dcca652
-
SHA1
f1b214aa8d48ed152dfe93e897b871751363f0c2
-
SHA256
8e6981d8311dae27119abc5f7a20989372cae47881f7c746c880decef4dfc3b3
-
SHA512
611344cc69e0560684cf65f94f243a7402c769e8668a15c9a3eda12ca61839c765612bc10ba812e11163fd6de4fdb0b105210d8065d241f40b4a732268007c40
-
SSDEEP
98304:6ZR9azHni3R3ousBqztSdq0doM+a76WmUydgul2bajywVmBTfnCAwvnZJ:6ZnaiG3Bq5UPRrul4imRnClv
Static task
static1
Behavioral task
behavioral1
Sample
formulario_agendamiento_citas.msi
Resource
win10ltsc2021-20250113-en
Malware Config
Extracted
remcos
NOVIEMBRE 13 MUCHACHA
imaxatmonk.imaxatmonk.com:2204
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
Acobatlg.exe
-
copy_folder
edqelofh
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
vlitanhs
-
mouse_option
false
-
mutex
necoclior-AOS1YP
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
formulario_agendamiento_citas.msi 4
-
Size
5.1MB
-
MD5
b0b0ce5887fe4e050976eb7b6dcca652
-
SHA1
f1b214aa8d48ed152dfe93e897b871751363f0c2
-
SHA256
8e6981d8311dae27119abc5f7a20989372cae47881f7c746c880decef4dfc3b3
-
SHA512
611344cc69e0560684cf65f94f243a7402c769e8668a15c9a3eda12ca61839c765612bc10ba812e11163fd6de4fdb0b105210d8065d241f40b4a732268007c40
-
SSDEEP
98304:6ZR9azHni3R3ousBqztSdq0doM+a76WmUydgul2bajywVmBTfnCAwvnZJ:6ZnaiG3Bq5UPRrul4imRnClv
-
Remcos family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-