General
-
Target
3960-49-0x0000000010710000-0x0000000010792000-memory.dmp
-
Size
520KB
-
Sample
231002-jpzm6ahh79
-
MD5
4488359f0432d277aaba71047df50540
-
SHA1
921ac8d0ef99d3e4e1a673e8d1846a9709321b12
-
SHA256
5a5410c95a1f5d314605601b84c1f20c48b3f2b82ca1886d66b29514ec86b412
-
SHA512
6336b82b39bec6b6ab089364f843f0b2ee43c11a05af089a1a6267ad5a278f47c30bde367e64ef2b409d21368c385ad070d10c15092a53dac800531d7c06401b
-
SSDEEP
6144:zQLQwgk9nMg3Su4+T0/xWUXQMk7Egvu5NKdCqMrTbSWXx7KOsAOZZeehXhcUI7ov:zrwgGbSua/UUjkhvu5NyMnds/Ze18v
Behavioral task
behavioral1
Sample
3960-49-0x0000000010710000-0x0000000010792000-memory.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
3960-49-0x0000000010710000-0x0000000010792000-memory.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
remcos
RemoteHost
donpapii.duckdns.org:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
TYETEYEUEYEUEU
-
mouse_option
false
-
mutex
Rmc-601YCE
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
3960-49-0x0000000010710000-0x0000000010792000-memory.dmp
-
Size
520KB
-
MD5
4488359f0432d277aaba71047df50540
-
SHA1
921ac8d0ef99d3e4e1a673e8d1846a9709321b12
-
SHA256
5a5410c95a1f5d314605601b84c1f20c48b3f2b82ca1886d66b29514ec86b412
-
SHA512
6336b82b39bec6b6ab089364f843f0b2ee43c11a05af089a1a6267ad5a278f47c30bde367e64ef2b409d21368c385ad070d10c15092a53dac800531d7c06401b
-
SSDEEP
6144:zQLQwgk9nMg3Su4+T0/xWUXQMk7Egvu5NKdCqMrTbSWXx7KOsAOZZeehXhcUI7ov:zrwgGbSua/UUjkhvu5NyMnds/Ze18v
Score1/10 -