General
-
Target
d512aae6332400529ace4e7b466bf545c4031d3c54fe36d4fe88f322ff71c7c6.bin
-
Size
1.5MB
-
Sample
240313-z46b9abc62
-
MD5
10d839675c54cc735dbf5ddfb6a20048
-
SHA1
b71c15de67291315c88aefaefbb9b7a31f334483
-
SHA256
d512aae6332400529ace4e7b466bf545c4031d3c54fe36d4fe88f322ff71c7c6
-
SHA512
37aec7ac9cb7192653403b7cd6483ed81704230f386f2c1379b30924558d0d80144d261523ba9992ad5c98a427b4902bf9f2a9589928673a62b8c397bca5651e
-
SSDEEP
49152:pf4Uxd67MNaptWke8bcs4my+3XDq6h6YsSCWCt755sFa:pXxkMESNsvRRhDKSs
Static task
static1
Behavioral task
behavioral1
Sample
Ofx RAD05001 40 03 013 2024 00450 00.exe
Resource
win7-20240220-en
Malware Config
Extracted
remcos
JORDAN
amapola.con-ip.com:7770
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-YTQPQ7
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
Ofx RAD05001 40 03 013 2024 00450 00.exe
-
Size
1023.9MB
-
MD5
76d8531f558cf1e45387137a1b91670f
-
SHA1
82a4a9a3369c7b5610c38cf68cdee4c43f21d323
-
SHA256
bf20c21df71040b3cf3b9ad5ce6fb0d97fceccdb9e9d547a80d9f5abe46437ca
-
SHA512
4b14d8ca43790fc3680cde1094017fe81f9eec204b7f7c3c9bfe0e1694683bd6e0e3fd752bae04fb0f20f7fa3da0bfe3731549da1bf18132fdf6a9bf8beb7d3a
-
SSDEEP
12288:4GBgEAeHszumED9CS8RwvWV9fV8S4Y2QYFz43VxRW:hBgEApqmWmwE9fiBj8fRW
-
Suspicious use of SetThreadContext
-