General
-
Target
INVOICEDDOCUMENTFILE00DH405858FEGHR88R.tar
-
Size
932KB
-
Sample
250204-w7j2mswngv
-
MD5
61438ad4be36c8256b3f97bbdd15dac2
-
SHA1
aee91366bb4646397823d73e9906247605502f94
-
SHA256
b1dd46f1ff62dea312ca3fa6f2bb5c23161971fcd71ce23fa8bf921501384f05
-
SHA512
12df1b1ab30f2d57915131c846a973c228573d8f83138e2ebc5aebd72d2265ac5d6a056794f7013b6a047f381daef2ba746723c822e468b70de60625650b9888
-
SSDEEP
24576:cSrIJulBXTqaBNlmMh+/3Vo1Y9INRSV/FobdERvNrAm:Rs6T9Bnmz/3V5KrSLobd2ZX
Static task
static1
Behavioral task
behavioral1
Sample
vwfGI75DCjPX5gK.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
vwfGI75DCjPX5gK.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
remcos
RemoteHost
tjwpn04kn.localto.net:2247
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
hytg
-
mouse_option
false
-
mutex
Rmc-JD0XH1
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
vwfGI75DCjPX5gK.pif
-
Size
1.1MB
-
MD5
1692cdb5ee56b3f17e1aa1514c8dd3e8
-
SHA1
6323c53db834380949ec820c2964bbe079662ad4
-
SHA256
0ee949c974ffb77c9c61400f423355b9670d0b5918a85331bb34b15fa6a1d20b
-
SHA512
48844ff2e284010c2f33d8a1837413766d16b6cbf5d3b24035ded467c8ca4313be3db0a42e5a8c680d8d198e2ea6782067df502d9e465e19aa07fa58bf5914ee
-
SSDEEP
24576:BAorweYxrXqa1dNMQd+TtnSXYv+Nd+Vp3obdg3vb6u:BvwFX91zMhTtnJmH+zobdS6u
Score10/10-
Remcos family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-