General
-
Target
475a71934a9da9e0120b9a922ba1d735243839cd3486640abd178a779a559efb.xz
-
Size
763KB
-
Sample
250213-echrnasnbn
-
MD5
05c06d3bc6c2c14102821d778ecb52ac
-
SHA1
6a59764eb30eedb467124854bec7a636a788c943
-
SHA256
475a71934a9da9e0120b9a922ba1d735243839cd3486640abd178a779a559efb
-
SHA512
b7d2d0904d627be16974c89801bef6f2749368973d35a50e33ec6df718f78ed07b985bbfd61fbffe2125d204e94690a0f1f517943144a08e677982914842c1f0
-
SSDEEP
12288:35hHyhFKkQP1HIyPm/aZxMV4wgZ9drBMgrHBxHNG2I+8c8:XiKVze/aL5wgZ3rBvhxHNb8
Static task
static1
Behavioral task
behavioral1
Sample
quotation.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
quotation.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250207-en
Malware Config
Extracted
remcos
P2-RemoteHost
46.183.222.85:49327
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-OMNE4N
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
quotation.exe
-
Size
857KB
-
MD5
35c34e6e68ec3f3abe65247dabaa92ac
-
SHA1
ea00abbc843585fe658c59c2c5a07b661acb7294
-
SHA256
ccf730b6af6f95df83d0ef459879ff64acc1aa68e3ec3bc4d721474698ae7c31
-
SHA512
e7813090fa3486e5b199696a102dc74271f392ff8efec24ef981b56b820a74e2054ac1eae1b59476c935d4e9f9296bebccb5f6d9a96688cf15ad60cae55c61fd
-
SSDEEP
12288:dV0sKNvgnt/a8gvgNEIDfdw4wuOOU4djLTr8ELDb6sZugTGU6uAAML1iSGLwf4us:dOTN4tUgVwHVILTr8436/V4uVtCNOy
-
Guloader family
-
Remcos family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
b8992e497d57001ddf100f9c397fcef5
-
SHA1
e26ddf101a2ec5027975d2909306457c6f61cfbd
-
SHA256
98bcd1dd88642f4dd36a300c76ebb1ddfbbbc5bfc7e3b6d7435dc6d6e030c13b
-
SHA512
8823b1904dccfaf031068102cb1def7958a057f49ff369f0e061f1b4db2090021aa620bb8442a2a6ac9355bb74ee54371dc2599c20dc723755a46ede81533a3c
-
SSDEEP
192:PPtkumJX7zB22kGwfy0mtVgkCPOs81un:E702k5qpds8Qn
Score8/10-
Downloads MZ/PE file
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1