General
-
Target
8864b508e11703efd0dfec01cf7e5b1f1f53bab99eb66ca8c4ee3884acb8f5a2.exe
-
Size
482KB
-
Sample
250213-f4c6xstra1
-
MD5
72351686e502b31b3649f3b0b8f84331
-
SHA1
50a3f1220ccd0b7cea5e3333c5aa59d4ecd7681f
-
SHA256
8864b508e11703efd0dfec01cf7e5b1f1f53bab99eb66ca8c4ee3884acb8f5a2
-
SHA512
e5268e9593fc84727749bab82380a2a9e845463bea1c577af9a688e067e8f4aba6fce4fb02c79229570c0bbb77e293e3682065436b97c327104d66888037ab3c
-
SSDEEP
12288:913ak/mBXTG4/1v08KI7ZnMEF76JqmsvZQNS:Xak/mBXTV/R0nEF76gFZ2
Behavioral task
behavioral1
Sample
8864b508e11703efd0dfec01cf7e5b1f1f53bab99eb66ca8c4ee3884acb8f5a2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8864b508e11703efd0dfec01cf7e5b1f1f53bab99eb66ca8c4ee3884acb8f5a2.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
remcos
RemoteHost
192.3.243.136:6878
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-JARS2X
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
8864b508e11703efd0dfec01cf7e5b1f1f53bab99eb66ca8c4ee3884acb8f5a2.exe
-
Size
482KB
-
MD5
72351686e502b31b3649f3b0b8f84331
-
SHA1
50a3f1220ccd0b7cea5e3333c5aa59d4ecd7681f
-
SHA256
8864b508e11703efd0dfec01cf7e5b1f1f53bab99eb66ca8c4ee3884acb8f5a2
-
SHA512
e5268e9593fc84727749bab82380a2a9e845463bea1c577af9a688e067e8f4aba6fce4fb02c79229570c0bbb77e293e3682065436b97c327104d66888037ab3c
-
SSDEEP
12288:913ak/mBXTG4/1v08KI7ZnMEF76JqmsvZQNS:Xak/mBXTV/R0nEF76gFZ2
-
Remcos family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Accesses Microsoft Outlook accounts
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Browser Extensions
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Component Object Model Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1