General
-
Target
ad7944585459312eceb71221e89b7018.exe
-
Size
1.3MB
-
Sample
250209-erh1zavmbz
-
MD5
ad7944585459312eceb71221e89b7018
-
SHA1
74a633aeb8b7214cd035a9a767d6b8e7796e6886
-
SHA256
a3ab1ca451d4b020eea6ba2d62e987412bd3b09a4993ea803c8105e932274177
-
SHA512
f30d3446a95e7d7b927b27efd70f3be9f28177e0cabaa634d2cf440937578b8752152bad62b9876234fee964f2a9ed1cc76ca75153cf754a8156f49d53beed9e
-
SSDEEP
24576:/orvz2P1S4CcWArIu/YmM3LmTwoSXo9OvOJ2Vioy:ke5taMM3Lxoh9OAKioy
Static task
static1
Behavioral task
behavioral1
Sample
ad7944585459312eceb71221e89b7018.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ad7944585459312eceb71221e89b7018.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral5
Sample
Norby.ps1
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
Norby.ps1
Resource
win10v2004-20250207-en
Malware Config
Extracted
remcos
Send
kavemarb99juyet1.duckdns.org:4688
kavemarb99juyet1.duckdns.org:4689
kavemarb99juyet2.duckdns.org:4688
kavemarb99juyet3.duckdns.org:4688
kavemarb99juyet4.duckdns.org:4688
kavemarb99juyet5.duckdns.org:4688
kavemarb99juyet6.duckdns.org:4688
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
osokwu.exe
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
alepoty.dat
-
keylog_flag
false
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
kijmnbytgs-Y92N9U
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
- startup_value
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
ad7944585459312eceb71221e89b7018.exe
-
Size
1.3MB
-
MD5
ad7944585459312eceb71221e89b7018
-
SHA1
74a633aeb8b7214cd035a9a767d6b8e7796e6886
-
SHA256
a3ab1ca451d4b020eea6ba2d62e987412bd3b09a4993ea803c8105e932274177
-
SHA512
f30d3446a95e7d7b927b27efd70f3be9f28177e0cabaa634d2cf440937578b8752152bad62b9876234fee964f2a9ed1cc76ca75153cf754a8156f49d53beed9e
-
SSDEEP
24576:/orvz2P1S4CcWArIu/YmM3LmTwoSXo9OvOJ2Vioy:ke5taMM3Lxoh9OAKioy
-
Remcos family
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Adds Run key to start application
-
Blocklisted process makes network request
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
$PLUGINSDIR/nsExec.dll
-
Size
6KB
-
MD5
ec62e1a8d16d8f1b0eb792aa26e5de5c
-
SHA1
faa219618aec99cffb81c312728dc56c1fdc5798
-
SHA256
193d396fc7be5fed9d585de3c43e23d640c1dce725499f0274b3898c248545aa
-
SHA512
cb3f3458cf734ab7b964ed25cac87ff2938292eed9caae1305b2e5975bde885f4d8b06d05d4099ef614982cd55d97e9ddc0f13bbe2cdd9fb642d008788ed3017
-
SSDEEP
96:O7fhZwXd8KgEbAa9PweF1WxD8ZLMJGgmkNp38:/N8KgWAuLWxD8ZAGgmkN
Score8/10-
Downloads MZ/PE file
-
-
-
Target
Norby.Drs
-
Size
52KB
-
MD5
237cdf672782754d57c42a5b82371b98
-
SHA1
6fe41a22c98e07b85ceb25b0870c539fe969197d
-
SHA256
26c1ca3a25a867de4b6c580a67c25f0b772a8d0d1ee9bb87facf3daa741cac57
-
SHA512
c97e1a229e3280c591b0bc76ea6850e8c5ee90420eea1d09a9a5f1effd264d06c8ce4aae166d43de00f1fc68422f277809cd899e33fee505d9be116efa8a0ce9
-
SSDEEP
1536:80FHbCINgp4KZE6oMXF7BaHqljyJuamYN:HHbClpBZagu3N
Score8/10-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1