General
-
Target
af2d72fc2c8e4b4a6b7be2d7b5806d37ffc13b27d2a210ffffcc8c963862e184.exe
-
Size
2.6MB
-
Sample
250217-pmw25synaq
-
MD5
a5bee6a7836dcd947ff0159da4ca0b29
-
SHA1
9f86f98d5777bc73753cc5a70a2f259b8e1b9e82
-
SHA256
af2d72fc2c8e4b4a6b7be2d7b5806d37ffc13b27d2a210ffffcc8c963862e184
-
SHA512
6afc31772009ed4ee6e4ba9733b563bc379a47491cea633054cdce4e6f8798456d202171f212b3572e6d88c90d6d8a1ffff5f484707e5186e0b170ab6f8167e7
-
SSDEEP
49152:PYbdYAm4zEbdYAm4zXbdYAm4zKbdYAm4zFbdYAm4zB3An3AI3AJ3AiW538r/39vG:PSdrWdrrdrAdr1drlA3AaAtAuv9vpn43
Static task
static1
Behavioral task
behavioral1
Sample
af2d72fc2c8e4b4a6b7be2d7b5806d37ffc13b27d2a210ffffcc8c963862e184.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
af2d72fc2c8e4b4a6b7be2d7b5806d37ffc13b27d2a210ffffcc8c963862e184.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
remcos
mranon2025G
eddy2025.ddns.net:2606
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
word32.exe
-
copy_folder
Word
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
data.dat
-
keylog_flag
false
-
keylog_folder
Update
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
!"$£%&1112222/&HGFDSVC%$/&%&uty%/&%/UjygthUJ-GL327K
-
screenshot_crypt
true
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
- startup_value
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
af2d72fc2c8e4b4a6b7be2d7b5806d37ffc13b27d2a210ffffcc8c963862e184.exe
-
Size
2.6MB
-
MD5
a5bee6a7836dcd947ff0159da4ca0b29
-
SHA1
9f86f98d5777bc73753cc5a70a2f259b8e1b9e82
-
SHA256
af2d72fc2c8e4b4a6b7be2d7b5806d37ffc13b27d2a210ffffcc8c963862e184
-
SHA512
6afc31772009ed4ee6e4ba9733b563bc379a47491cea633054cdce4e6f8798456d202171f212b3572e6d88c90d6d8a1ffff5f484707e5186e0b170ab6f8167e7
-
SSDEEP
49152:PYbdYAm4zEbdYAm4zXbdYAm4zKbdYAm4zFbdYAm4zB3An3AI3AJ3AiW538r/39vG:PSdrWdrrdrAdr1drlA3AaAtAuv9vpn43
-
Remcos family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Browser Extensions
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Component Object Model Hijacking
1