General
-
Target
1548-75-0x0000000000400000-0x000000000047E000-memory.dmp
-
Size
504KB
-
Sample
220728-vbyz9ahde9
-
MD5
8a8796cc5dade9f89a408d9d4e177c13
-
SHA1
d5c3e1c7581a33f298785448b88c356a2e324537
-
SHA256
c4268d57dca8cfcd2fc39cfe915c496ef1669b84cb05c22d96c9050269cd1867
-
SHA512
faadaa8971ee39608459d552bb960163c8fbd80ffcdbe52d4cf9b24502a7eab360e8530cc080e73c609c2f5ec63e6ce8fa01d723a890ed72cff4ce66f00c485d
Behavioral task
behavioral1
Sample
1548-75-0x0000000000400000-0x000000000047E000-memory.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
1548-75-0x0000000000400000-0x000000000047E000-memory.exe
Resource
win10v2004-20220721-en
Malware Config
Extracted
remcos
XP
xpremcuz300622.ddns.net:3542
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
oos.exe
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
false
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Remcos-MMP2I7
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
kkl
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
1548-75-0x0000000000400000-0x000000000047E000-memory.dmp
-
Size
504KB
-
MD5
8a8796cc5dade9f89a408d9d4e177c13
-
SHA1
d5c3e1c7581a33f298785448b88c356a2e324537
-
SHA256
c4268d57dca8cfcd2fc39cfe915c496ef1669b84cb05c22d96c9050269cd1867
-
SHA512
faadaa8971ee39608459d552bb960163c8fbd80ffcdbe52d4cf9b24502a7eab360e8530cc080e73c609c2f5ec63e6ce8fa01d723a890ed72cff4ce66f00c485d
Score1/10 -