General
-
Target
RFQ-87868TX.exe
-
Size
1.3MB
-
Sample
250403-qxh4psxtey
-
MD5
a20e99ab7a03450723e9dea5f796040d
-
SHA1
a389e1c7bd5fb577532dae9f12552f28e19f5000
-
SHA256
195255b4bc9e8153a583a03140e5a6585680b3154154889e56ccbe2f17f0945f
-
SHA512
071b996c43713e579dad955491505c3cf29baa0d1f0010f8ff62d7e1f4b367ba1b7d0b6dd622a59233018e3d0567f9605ef1d5ff014c5c613876fd2a6d270d53
-
SSDEEP
24576:lu6J33O0c+JY5UZ+XC0kGso6FaV5EDSVMWcBb7mKyFybSVfWY:nu0c++OCvkGs9FaVGBb7PyzgY
Static task
static1
Behavioral task
behavioral1
Sample
RFQ-87868TX.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
remcos
RemoteHost
45.141.215.102:2404
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-KPHE1L
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
RFQ-87868TX.exe
-
Size
1.3MB
-
MD5
a20e99ab7a03450723e9dea5f796040d
-
SHA1
a389e1c7bd5fb577532dae9f12552f28e19f5000
-
SHA256
195255b4bc9e8153a583a03140e5a6585680b3154154889e56ccbe2f17f0945f
-
SHA512
071b996c43713e579dad955491505c3cf29baa0d1f0010f8ff62d7e1f4b367ba1b7d0b6dd622a59233018e3d0567f9605ef1d5ff014c5c613876fd2a6d270d53
-
SSDEEP
24576:lu6J33O0c+JY5UZ+XC0kGso6FaV5EDSVMWcBb7mKyFybSVfWY:nu0c++OCvkGs9FaVGBb7PyzgY
-
Remcos family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-