General
-
Target
2025-04-05_e873d3db9c5dedf47bb49b01711f53d7_amadey_smoke-loader
-
Size
23.0MB
-
Sample
250405-rybaxsy1dx
-
MD5
e873d3db9c5dedf47bb49b01711f53d7
-
SHA1
08e06fc6afa397e431ad7ca4c0e3265acf713948
-
SHA256
7b2bca7cd4dea6c148024bc91d0918b28f9993462cc7199aa6ee32256f0d2b80
-
SHA512
6897c2351f4b73ad641621ed819c6086249922d3cd9fde3bef5770cb0415176ea4ab49291b2b212342607c82ddadb3e583ad2280bb05d9f6445155d2930cce30
-
SSDEEP
393216:Q8t/QCMfMwqfGr8vOu7deqcbOL78sJwf5tyDAn5aYKLW6:n1QtUwJu5eNo0f5EDAn1KR
Static task
static1
Malware Config
Extracted
remcos
2.5.0 Pro
Spot1511
nvdiedico.knowsitall.info:3297
dico.is-a-hard-worker.com:3297
roxy.is-by.us:3297
nicholds.dyndns-web.com:3297
nvdiedicozeus.dyndns-web.com:3297
nvdieroxy.servebbs.org:3297
nvdiedicob.is-a-chef.org:3297
nerverdieorcus.is-a-doctor.com:3297
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
rmlogs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Rmxplgdatas-ORUCBL
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
wikipedia;solitaire;
Extracted
netwire
wire.mine.nu:9702
dico.is-very-bad.org:9702
roxy.dynalias.net:9702
regiskm67.buyshouses.net:9702
zeusnodie.mypets.ws:9702
nvdiedicobies.is-a-hard-worker.com:9702
nvdieroxy.kicks-ass.net:9702
nvdiedicozeuse.webhop.org:9702
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
Spot1411
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
Entubebd
-
offline_keylogger
true
-
password
0000
-
registry_autorun
false
-
use_mutex
true
Targets
-
-
Target
2025-04-05_e873d3db9c5dedf47bb49b01711f53d7_amadey_smoke-loader
-
Size
23.0MB
-
MD5
e873d3db9c5dedf47bb49b01711f53d7
-
SHA1
08e06fc6afa397e431ad7ca4c0e3265acf713948
-
SHA256
7b2bca7cd4dea6c148024bc91d0918b28f9993462cc7199aa6ee32256f0d2b80
-
SHA512
6897c2351f4b73ad641621ed819c6086249922d3cd9fde3bef5770cb0415176ea4ab49291b2b212342607c82ddadb3e583ad2280bb05d9f6445155d2930cce30
-
SSDEEP
393216:Q8t/QCMfMwqfGr8vOu7deqcbOL78sJwf5tyDAn5aYKLW6:n1QtUwJu5eNo0f5EDAn1KR
-
NetWire RAT payload
-
Netwire family
-
Remcos family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-