General
-
Target
ac86c915f906f5f27b59d28eb0b9d5e8398619acf3ec95598dfe82b8de3d0ea3.bin
-
Size
1.3MB
-
Sample
240313-zx85kagh4s
-
MD5
000fe3d4e9b35cdb82f0f7a5c6c5ba22
-
SHA1
8b2d069f9ef51f169c8cf0de222e491564632a2b
-
SHA256
ac86c915f906f5f27b59d28eb0b9d5e8398619acf3ec95598dfe82b8de3d0ea3
-
SHA512
9cc8dc9d790e586d991fc0d1dfd0ecb0e61d3728d3673294529cc39a47dfc8c823c38eabdd0b9cc6b299d3e3061f5dece3c5540936e1b3f488203efa3854b0af
-
SSDEEP
24576:B7YaAX9PnguXa1UtT6BovkS8LGy/jLwJK5nbAomGn5Xdmy+:qNX5nDhpvrK1b3hE
Static task
static1
Behavioral task
behavioral1
Sample
PROCESO DEMANDA. REF; 3456980012-770-2024..exe
Resource
win7-20240221-en
Malware Config
Extracted
remcos
JORDAN
amapola.con-ip.com:7770
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-YTQPQ7
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
PROCESO DEMANDA. REF; 3456980012-770-2024..exe
-
Size
1023.9MB
-
MD5
76d8531f558cf1e45387137a1b91670f
-
SHA1
82a4a9a3369c7b5610c38cf68cdee4c43f21d323
-
SHA256
bf20c21df71040b3cf3b9ad5ce6fb0d97fceccdb9e9d547a80d9f5abe46437ca
-
SHA512
4b14d8ca43790fc3680cde1094017fe81f9eec204b7f7c3c9bfe0e1694683bd6e0e3fd752bae04fb0f20f7fa3da0bfe3731549da1bf18132fdf6a9bf8beb7d3a
-
SSDEEP
12288:4GBgEAeHszumED9CS8RwvWV9fV8S4Y2QYFz43VxRW:hBgEApqmWmwE9fiBj8fRW
-
Suspicious use of SetThreadContext
-