General
-
Target
88621ae4a26129a6043d8ce76550b766840784af1516b45d7cafefb4a8a85c16.zip
-
Size
529KB
-
Sample
230308-ngwnrafd7z
-
MD5
f83f41de20061fdf7084a31a07fc81f8
-
SHA1
fd01fc855a3d23259fcc0c13d857c013772ef5e5
-
SHA256
24c703c4dd50f019ecc8d261702a339ea8bb5f83d8187228ea561a320568c9a7
-
SHA512
ed59f0eda751b55f12b6cdcd706fc98cceba2f13816ac0278d4a8f59e6409e2ab4fa583da52984a2d1c6a7ea97c4c7d5dd7eeee6d28c674237340ee682cabd45
-
SSDEEP
12288:MqKQ4gRU1Loih2C271ug5EEddDPZySRCf6XfJDf6:MqKcmc3Cez53rRC0fJDf6
Static task
static1
Behavioral task
behavioral1
Sample
rooming list.exe
Resource
win7-20230220-en
Malware Config
Extracted
remcos
machie
logzhome.mywire.org:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-QI94R6
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
rooming list.exe
-
Size
300.0MB
-
MD5
16500be6641b3826354c8a2c8bc42a3e
-
SHA1
b557c2d8036db807611414891523eb09318d7630
-
SHA256
e4a386d2f0204e9f58187dcd4ea1d0670bc5369fbbb5b60056090441348368b2
-
SHA512
4b1422be191b6fc7884ae131da1044b01ee6fec73f8390995e644f114281c072cf1b0c41a08c9b39b9ae4577ada2a33842caf632d52184e1eeb5525728bf1bff
-
SSDEEP
12288:YvCEz4cRx+MHXCa/TaBCT0v+yAQqjLzy/xXpurm+:YdEHSC8WB00vlAQqH+/lpu7
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-