General
-
Target
173766366548204ede648f5b7a7fa4d931df9419dffab5574fd26b7088333bf4a797d053cf821.dat-decoded.exe
-
Size
234KB
-
Sample
250123-y5jn7ssjct
-
MD5
ff249f4a658f6cfc9ef1444ebc73e94d
-
SHA1
1542f784b47d815edfdacbe2d431b6752a18e48a
-
SHA256
fa947c9e00ecaa3c7cbaf13b91a2fce6ba0a356626e75a77fe2a8fbfad38d284
-
SHA512
343e9ecc755fc1d630878e0c9950ea5a5596f484bc84e0f60035757f82a8525b61e3ed81ec5128d737b67d5017ec2750ac7acf7237f9ab15642ea21c7b250f37
-
SSDEEP
6144:kP761yOPJaNOKnod5naEtdpB6JdJf7s/ENdcAcrNOr0/RdVVIQ:kP7M0NOK3856JzjsAOZrNlA
Behavioral task
behavioral1
Sample
173766366548204ede648f5b7a7fa4d931df9419dffab5574fd26b7088333bf4a797d053cf821.dat-decoded.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
173766366548204ede648f5b7a7fa4d931df9419dffab5574fd26b7088333bf4a797d053cf821.dat-decoded.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
remcos
YoungMoney
krakencryptotrades.duckdns.org:2025
recoverytrades.duckdns.org:2026
krakenrecoveries.freemyip.com:2026
007lora.varpourtec.com:2026
masterb12.risunn.com:2026
risunn.com:2026
risunn.com:2025
nunubv1.fratellillottini.com:2026
fratellillottini.com:2025
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-VA9UBS
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
173766366548204ede648f5b7a7fa4d931df9419dffab5574fd26b7088333bf4a797d053cf821.dat-decoded.exe
-
Size
234KB
-
MD5
ff249f4a658f6cfc9ef1444ebc73e94d
-
SHA1
1542f784b47d815edfdacbe2d431b6752a18e48a
-
SHA256
fa947c9e00ecaa3c7cbaf13b91a2fce6ba0a356626e75a77fe2a8fbfad38d284
-
SHA512
343e9ecc755fc1d630878e0c9950ea5a5596f484bc84e0f60035757f82a8525b61e3ed81ec5128d737b67d5017ec2750ac7acf7237f9ab15642ea21c7b250f37
-
SSDEEP
6144:kP761yOPJaNOKnod5naEtdpB6JdJf7s/ENdcAcrNOr0/RdVVIQ:kP7M0NOK3856JzjsAOZrNlA
-
Remcos family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-