General
-
Target
xpKemuNsr6Zc.exe
-
Size
483KB
-
Sample
231124-rdtxjace8x
-
MD5
2fb8c581cf0bb31a95221b308d654e06
-
SHA1
7415c98c6355db123a7960bc0435a01228df5766
-
SHA256
5883f823c20dba07b8340163a93128f2b056805c441ad7a7162d139e82c503b6
-
SHA512
f237b15b43779c0d2a74dff96b8f5df9b6e6577bfdc3a9c2dfd5a2d6829fdffa2ad5f16ecd63afc39255ec5ba09ef6c087cb3b7c7764d5ae0697d20e04f3d67f
-
SSDEEP
6144:+/7iPrcL3ArwhBq7Kjsn9iHGXg0lwGS9MNNhdFvPxps9gsAOZZuAXec7z7ov:+/uPq3AfK496Gw0lwGXN3pvs/ZuW8v
Behavioral task
behavioral1
Sample
xpKemuNsr6Zc.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
xpKemuNsr6Zc.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
remcos
RemoteHost (em ingl�s)
9.tcp.ngrok.io:22201
-
audio_folder
MicRecords (em inglês)
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-FRI70T
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Capturas de tela
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
xpKemuNsr6Zc.exe
-
Size
483KB
-
MD5
2fb8c581cf0bb31a95221b308d654e06
-
SHA1
7415c98c6355db123a7960bc0435a01228df5766
-
SHA256
5883f823c20dba07b8340163a93128f2b056805c441ad7a7162d139e82c503b6
-
SHA512
f237b15b43779c0d2a74dff96b8f5df9b6e6577bfdc3a9c2dfd5a2d6829fdffa2ad5f16ecd63afc39255ec5ba09ef6c087cb3b7c7764d5ae0697d20e04f3d67f
-
SSDEEP
6144:+/7iPrcL3ArwhBq7Kjsn9iHGXg0lwGS9MNNhdFvPxps9gsAOZZuAXec7z7ov:+/uPq3AfK496Gw0lwGXN3pvs/ZuW8v
Score7/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Legitimate hosting services abused for malware hosting/C2
-