General
-
Target
cc4ccb3d451d2339ffc3c1ffbfd955e40d4903c2c6e82661ea0ec9c693272abb.exe
-
Size
217KB
-
Sample
250217-pjmdjazlx6
-
MD5
487e5d1ae61f24bef39c819a001d9929
-
SHA1
7396b0bb0fffa5641a3a1a15b3e07134bd6203ec
-
SHA256
cc4ccb3d451d2339ffc3c1ffbfd955e40d4903c2c6e82661ea0ec9c693272abb
-
SHA512
e4eabbd10743d07317f5a339bffeff2f35760bdb12ab14d19648fa5e1da749cd436e1ae73625d525cabc0aa188b4e109a637638649c1429689294993bb4ddead
-
SSDEEP
3072:GHWiInUBb8btrDuJsJoW+OD5a0f7giGvkKD6aR0tyiKFkivCZSWC628p3p3outTs:GHWiInUe1f4rfvrDxKOpvUO3wdoS
Behavioral task
behavioral1
Sample
cc4ccb3d451d2339ffc3c1ffbfd955e40d4903c2c6e82661ea0ec9c693272abb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cc4ccb3d451d2339ffc3c1ffbfd955e40d4903c2c6e82661ea0ec9c693272abb.exe
Resource
win10v2004-20250211-en
Malware Config
Extracted
remcos
mranon
eddy2024.ddns.net:2606
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
cortana32.exe
-
copy_folder
mscortana
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
data.dat
-
keylog_flag
false
-
keylog_folder
microsofte2dge
-
mouse_option
false
-
mutex
RmcSGDS@@GTHFbvg34òae"£$££$-IHC4MV
-
screenshot_crypt
true
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
- startup_value
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
cc4ccb3d451d2339ffc3c1ffbfd955e40d4903c2c6e82661ea0ec9c693272abb.exe
-
Size
217KB
-
MD5
487e5d1ae61f24bef39c819a001d9929
-
SHA1
7396b0bb0fffa5641a3a1a15b3e07134bd6203ec
-
SHA256
cc4ccb3d451d2339ffc3c1ffbfd955e40d4903c2c6e82661ea0ec9c693272abb
-
SHA512
e4eabbd10743d07317f5a339bffeff2f35760bdb12ab14d19648fa5e1da749cd436e1ae73625d525cabc0aa188b4e109a637638649c1429689294993bb4ddead
-
SSDEEP
3072:GHWiInUBb8btrDuJsJoW+OD5a0f7giGvkKD6aR0tyiKFkivCZSWC628p3p3outTs:GHWiInUe1f4rfvrDxKOpvUO3wdoS
-
Remcos family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Browser Extensions
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Component Object Model Hijacking
1