General
-
Target
1.rar
-
Size
914KB
-
Sample
250121-ld2dqawqbs
-
MD5
9e882353502e0404494faa8a815bc95d
-
SHA1
09fc3a1c2ef12ac5cb7dd5b42031190f4a90cbdb
-
SHA256
9618c4ca10c548db5e97be2bcff2995bd631c20135ba3cb99631d6554e50b7dc
-
SHA512
b389bc7e14b915ec8ce4aa0d214efb3bc490cb3ea71cc2649e76455b219002acaf2fad3f5a86b31281ef90f0321f8f36182f8f71faa77d939e2a2328285eb268
-
SSDEEP
24576:HeSPXkvE5wZBXD0YDxjKkaXsFwUgDoNj2JFG4UO/bP:5PqbI8RysFwhoP4xbP
Static task
static1
Behavioral task
behavioral1
Sample
DHL AWB# 13700658 DOCS.exe
Resource
win7-20241010-en
Malware Config
Extracted
remcos
54436
jandupdate873.webredirect.org:45688
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
538-8Q7AZ1
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
DHL AWB# 13700658 DOCS.exe
-
Size
1.0MB
-
MD5
4f7f4be9f7d4dce08243c683cde82441
-
SHA1
05ae46d21d6ace8e5c6202d1721f429b9077a6fc
-
SHA256
d82420c6174978cbfa6a7ece576ad2e5e3bc66324126298e46f5b1845b6a11b3
-
SHA512
ecb7848144cf58974e089f0ea12d2a37ccf425f0e028407cfdcc9e160af5c574d699e7bf19b3442f890e9635fd400d7ae077d4acac092b306984de024c339d3f
-
SSDEEP
24576:HrycfLAsNBbi6oRqh/Jlmi4oHU1Ca5YkC:HjfLAsNo62EhoC+YkC
-
Remcos family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-