General
-
Target
696-136-0x0000000000400000-0x000000000047E000-memory.dmp
-
Size
504KB
-
Sample
220728-t7yhxsaadp
-
MD5
2da8fc9227bdedcc3c780531a539e1de
-
SHA1
54d68cf33d21e2ded4f75f2c2fc3a1c4d4a8fee9
-
SHA256
fa9aaeced3ba2a9b926e81f209bd2ccd9c41ef629a20611c5297e66cb39f205f
-
SHA512
7f4b8aed85fae5e878bc39cf9fc4108859ce8902e2abb37dd6c793d7337423fd4b58da1afe6d36806737cfb1848c6e8dd9e8b16944e74e30a999fdb90d0aaa07
Behavioral task
behavioral1
Sample
696-136-0x0000000000400000-0x000000000047E000-memory.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
696-136-0x0000000000400000-0x000000000047E000-memory.exe
Resource
win10v2004-20220722-en
Malware Config
Extracted
remcos
XP
xpremcuz300622.ddns.net:3542
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
oos.exe
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
false
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Remcos-MMP2I7
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
kkl
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
696-136-0x0000000000400000-0x000000000047E000-memory.dmp
-
Size
504KB
-
MD5
2da8fc9227bdedcc3c780531a539e1de
-
SHA1
54d68cf33d21e2ded4f75f2c2fc3a1c4d4a8fee9
-
SHA256
fa9aaeced3ba2a9b926e81f209bd2ccd9c41ef629a20611c5297e66cb39f205f
-
SHA512
7f4b8aed85fae5e878bc39cf9fc4108859ce8902e2abb37dd6c793d7337423fd4b58da1afe6d36806737cfb1848c6e8dd9e8b16944e74e30a999fdb90d0aaa07
Score1/10 -