General
-
Target
3324-146-0x00000000045D0000-0x000000000464E000-memory.dmp
-
Size
504KB
-
Sample
220808-gbt5eagcc3
-
MD5
1e881f928da4b8b41e0c25a2c4dd285e
-
SHA1
7c2b0e3713f4a017fdf2f999b65800c1417c7c33
-
SHA256
ba138db44d4fbd80360149a9e841f7cbba4cac9758b7ce04a14112e840271e6b
-
SHA512
0883599cf5b36a2a72cfeaf9fa1f203d699473f44ed5562c9d7a5e4e4947488f869dcd21fd2bf011a6f121cba4241725bc5a5ecd08f0001f870d46ec1361c847
Behavioral task
behavioral1
Sample
3324-146-0x00000000045D0000-0x000000000464E000-memory.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
3324-146-0x00000000045D0000-0x000000000464E000-memory.exe
Resource
win10v2004-20220721-en
Malware Config
Extracted
remcos
Finally
185.62.86.145:42024
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
onedrivee
-
mouse_option
false
-
mutex
onedrive-TYU0OA
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
3324-146-0x00000000045D0000-0x000000000464E000-memory.dmp
-
Size
504KB
-
MD5
1e881f928da4b8b41e0c25a2c4dd285e
-
SHA1
7c2b0e3713f4a017fdf2f999b65800c1417c7c33
-
SHA256
ba138db44d4fbd80360149a9e841f7cbba4cac9758b7ce04a14112e840271e6b
-
SHA512
0883599cf5b36a2a72cfeaf9fa1f203d699473f44ed5562c9d7a5e4e4947488f869dcd21fd2bf011a6f121cba4241725bc5a5ecd08f0001f870d46ec1361c847
Score1/10 -