General
-
Target
316-70-0x0000000000400000-0x0000000000481000-memory.dmp
-
Size
516KB
-
Sample
230602-qj8gfabe55
-
MD5
ae4fbcb9c6d812f820a4eac7bce8d357
-
SHA1
92ea795308830362f8bf53093916781d694260cb
-
SHA256
f79f214c11c1fbb8a7da68337adcd3616140fcbef74175fc5429df3ced4b3d23
-
SHA512
b8c4e8f0b7993709500935170c6583baa917b4e21119f7e018e4c78e1ac032fa2f150c4b40227dbcc8f695ee874166c9b9923311db3a614bf3e8ba03d2901296
-
SSDEEP
12288:dRXxReZj3WZfj/2eSseWFaIe2+f8CL47bs/Zf2QDU:dx7cyF2eSsewS8W47eZO
Behavioral task
behavioral1
Sample
316-70-0x0000000000400000-0x0000000000481000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
316-70-0x0000000000400000-0x0000000000481000-memory.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
remcos
RemoteHost
127.0.0.1:2080
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-6IHMTY
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
316-70-0x0000000000400000-0x0000000000481000-memory.dmp
-
Size
516KB
-
MD5
ae4fbcb9c6d812f820a4eac7bce8d357
-
SHA1
92ea795308830362f8bf53093916781d694260cb
-
SHA256
f79f214c11c1fbb8a7da68337adcd3616140fcbef74175fc5429df3ced4b3d23
-
SHA512
b8c4e8f0b7993709500935170c6583baa917b4e21119f7e018e4c78e1ac032fa2f150c4b40227dbcc8f695ee874166c9b9923311db3a614bf3e8ba03d2901296
-
SSDEEP
12288:dRXxReZj3WZfj/2eSseWFaIe2+f8CL47bs/Zf2QDU:dx7cyF2eSsewS8W47eZO
Score1/10 -