Behavioral task
behavioral1
Sample
1468-56-0x0000000000400000-0x000000000041D000-memory.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1468-56-0x0000000000400000-0x000000000041D000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
1468-56-0x0000000000400000-0x000000000041D000-memory.dmp
-
Size
116KB
-
MD5
ebbe98988fda3d8aedb7a8ec6e98d370
-
SHA1
1c738cf5195db0501d4ba63350e2fee8e5bd48f0
-
SHA256
82ae427797ed40de89753f621902aadf0bd32076fb2cf69f317672c754838129
-
SHA512
f5665181aa1166c1553d29f97d11df0a82128e25cbfb09474548a15f59d5c98c1b81fb31e0ec464eff50d71be1e4f6ffa7c6518a3183bfac42b709208c2b5de0
-
SSDEEP
3072:ARf1hzYTGWVvJ8f2v1TbPzuMsIFSVNTh9XFF8r:ARdhzOv2fM13jsIFSVNTbXFFI
Malware Config
Extracted
remcos
1.7 Pro
1877
hawler.duckdns.org:2404
5.206.227.115:2404
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
svshost.exe
-
copy_folder
1877
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
false
-
install_flag
true
-
install_path
%WinDir%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
1877
-
keylog_path
%AppData%
-
mouse_option
true
-
mutex
1877_spelzoyulk
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screens
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
Google Update
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
Files
-
1468-56-0x0000000000400000-0x000000000041D000-memory.dmp.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 72KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX1 Size: 30KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE