General
-
Target
872-71-0x0000000000400000-0x000000000047E000-memory.dmp
-
Size
504KB
-
Sample
220806-hd5jlabfcm
-
MD5
81bc45f289d88d2a6bf6f0bbdc1a0adc
-
SHA1
153586133f16ad031999663a8cf51c2fee5b973c
-
SHA256
55cac4cf51cc9cda2d25a4b8b37d9efb59b1dde7e75bac6dcb20dacff1fb8864
-
SHA512
6b7d0d7c9e18df9edeb9681c8099c02ad67a660f8506db1ff0113a02574a8c653c0a93905cd268c81ca0cf329d6991199f2369d961929f8ac783eaa45920723e
Behavioral task
behavioral1
Sample
872-71-0x0000000000400000-0x000000000047E000-memory.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
872-71-0x0000000000400000-0x000000000047E000-memory.exe
Resource
win10v2004-20220722-en
Malware Config
Extracted
remcos
RemoteHost
172.111.234.100:5888
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-IY2SFS
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
872-71-0x0000000000400000-0x000000000047E000-memory.dmp
-
Size
504KB
-
MD5
81bc45f289d88d2a6bf6f0bbdc1a0adc
-
SHA1
153586133f16ad031999663a8cf51c2fee5b973c
-
SHA256
55cac4cf51cc9cda2d25a4b8b37d9efb59b1dde7e75bac6dcb20dacff1fb8864
-
SHA512
6b7d0d7c9e18df9edeb9681c8099c02ad67a660f8506db1ff0113a02574a8c653c0a93905cd268c81ca0cf329d6991199f2369d961929f8ac783eaa45920723e
Score1/10 -