General
-
Target
12.exe
-
Size
275KB
-
Sample
240327-szaapaad5y
-
MD5
d08b871274cd8c8e5033e354c55e44bc
-
SHA1
1ee737ecbe44bf49467b1743a6021df4a581e122
-
SHA256
e2a5c5c2e695cd3e44db874a2ceee23ec1915574c126f6b2f9c387802bd70e22
-
SHA512
fdfcdc5f6004d99dee8cff5b184554a347916b1ec9f510e4bcfa05d81c6aeb9bdedcea45104e8ba3c3a38c247d386d45ce84d4e75e102c541488466f5d5ed243
-
SSDEEP
3072:qs2fzJpw9ouUB4KkCkx5kKn7GLGGKgr/JhnZZoDiuTvORNpe:FG6dKk5HgDJhnZZoDiwvO1
Static task
static1
Behavioral task
behavioral1
Sample
12.exe
Resource
win7-20240221-es
Behavioral task
behavioral2
Sample
12.exe
Resource
win10v2004-20240226-es
Malware Config
Extracted
remcos
RemoteHost
laitheliar.duckdns.org:4047
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-JUNJ0J
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
12.exe
-
Size
275KB
-
MD5
d08b871274cd8c8e5033e354c55e44bc
-
SHA1
1ee737ecbe44bf49467b1743a6021df4a581e122
-
SHA256
e2a5c5c2e695cd3e44db874a2ceee23ec1915574c126f6b2f9c387802bd70e22
-
SHA512
fdfcdc5f6004d99dee8cff5b184554a347916b1ec9f510e4bcfa05d81c6aeb9bdedcea45104e8ba3c3a38c247d386d45ce84d4e75e102c541488466f5d5ed243
-
SSDEEP
3072:qs2fzJpw9ouUB4KkCkx5kKn7GLGGKgr/JhnZZoDiuTvORNpe:FG6dKk5HgDJhnZZoDiwvO1
Score10/10-
Detect ZGRat V1
-
Suspicious use of SetThreadContext
-