General
-
Target
1808-76-0x0000000000400000-0x0000000000480000-memory.dmp
-
Size
512KB
-
Sample
230323-b6xacsef9s
-
MD5
5559401c33de86b468e7e10f7e9ccf11
-
SHA1
d4c36883cbc730c1d1f045f878ded7fe1992ebfe
-
SHA256
0d255100124ecc5180bbb761299f18a3c0e472e6ce877835cf41b08aaea1d3f1
-
SHA512
c999c6b653b4a4067a30d12548ef33e0bf0afa2e5a7a63a36586457e6bfe6a6f1d891f50485b081b882ee210bce3693a22c3d18f6c2e8705df7abe620a2aa30c
-
SSDEEP
6144:Y43E0RO2xAQTC55PIzpVzi3ORDZZQMBt3JJmIGwZHEfcidC48h47QksAOZZPRXMT:Y406AQY5PupeoDrQ+3JJmYZHQJs/ZP
Behavioral task
behavioral1
Sample
1808-76-0x0000000000400000-0x0000000000480000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1808-76-0x0000000000400000-0x0000000000480000-memory.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
remcos
RemoteHost
ennenbach.duckdns.org:5800
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-QWQZF3
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
1808-76-0x0000000000400000-0x0000000000480000-memory.dmp
-
Size
512KB
-
MD5
5559401c33de86b468e7e10f7e9ccf11
-
SHA1
d4c36883cbc730c1d1f045f878ded7fe1992ebfe
-
SHA256
0d255100124ecc5180bbb761299f18a3c0e472e6ce877835cf41b08aaea1d3f1
-
SHA512
c999c6b653b4a4067a30d12548ef33e0bf0afa2e5a7a63a36586457e6bfe6a6f1d891f50485b081b882ee210bce3693a22c3d18f6c2e8705df7abe620a2aa30c
-
SSDEEP
6144:Y43E0RO2xAQTC55PIzpVzi3ORDZZQMBt3JJmIGwZHEfcidC48h47QksAOZZPRXMT:Y406AQY5PupeoDrQ+3JJmYZHQJs/ZP
Score3/10 -