General
-
Target
2700-34-0x0000000000400000-0x0000000000482000-memory.dmp
-
Size
520KB
-
Sample
240411-h55nnshf2z
-
MD5
d3ccea4baebe97ae4b7adf2c95ce4e20
-
SHA1
2c2436357a6d2fa47fb895a6ff0a64ed2c6a1af3
-
SHA256
3ec2af4b5c9bb02513b905dfa7217efdcec08dce2c3d9621bd4792d50e548cf1
-
SHA512
756c509c7b3bc9690a7172e8929ee46c26ae346c0777b47497d042c32263ddd13babb7cb4ea605fbb19861dcc2324c8246936e803cc06bdc3909c9fd706b4f4a
-
SSDEEP
6144:AXIktXfM8Lv86r9uVWAa2je4Z5zl4hgDHQQs4NTQjoHFsAOZZsAX4cN:AX7tPMK8ctGe4Dzl4h2QnuPs/Zs
Behavioral task
behavioral1
Sample
2700-34-0x0000000000400000-0x0000000000482000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2700-34-0x0000000000400000-0x0000000000482000-memory.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
remcos
RemoteHost
bignight.net:3363
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-1XSDBO
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
2700-34-0x0000000000400000-0x0000000000482000-memory.dmp
-
Size
520KB
-
MD5
d3ccea4baebe97ae4b7adf2c95ce4e20
-
SHA1
2c2436357a6d2fa47fb895a6ff0a64ed2c6a1af3
-
SHA256
3ec2af4b5c9bb02513b905dfa7217efdcec08dce2c3d9621bd4792d50e548cf1
-
SHA512
756c509c7b3bc9690a7172e8929ee46c26ae346c0777b47497d042c32263ddd13babb7cb4ea605fbb19861dcc2324c8246936e803cc06bdc3909c9fd706b4f4a
-
SSDEEP
6144:AXIktXfM8Lv86r9uVWAa2je4Z5zl4hgDHQQs4NTQjoHFsAOZZsAX4cN:AX7tPMK8ctGe4Dzl4h2QnuPs/Zs
Score1/10 -