General
-
Target
1872-13-0x0000000000400000-0x0000000000482000-memory.dmp
-
Size
520KB
-
Sample
240509-q8r6rach8y
-
MD5
d6b39213f12dcb7233b60c29feac79b3
-
SHA1
d0c6fa8003fcf80e840160e0d12adb89635ffaef
-
SHA256
cf8256c7a0bca0cb1c1159694bf4d43d936574c89c17ff8efc785c4780b886bf
-
SHA512
347d8077d59f2b7f03c4103e28feb3cccceaa212719feb7af7790a3503300a8402d1bdc125c29f04dbe7e2b06fc09cc202d8509e37ac6fc444a69e33f8c6724f
-
SSDEEP
6144:6XIktXfM8Lv86r9uVWAa2je4Z5zl4hgDHQQs4NTQjoHFsAOZZDAXYcN:6X7tPMK8ctGe4Dzl4h2QnuPs/ZD
Behavioral task
behavioral1
Sample
1872-13-0x0000000000400000-0x0000000000482000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1872-13-0x0000000000400000-0x0000000000482000-memory.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
remcos
PAPI
64.188.18.137:1604
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-RLYAO5
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
1872-13-0x0000000000400000-0x0000000000482000-memory.dmp
-
Size
520KB
-
MD5
d6b39213f12dcb7233b60c29feac79b3
-
SHA1
d0c6fa8003fcf80e840160e0d12adb89635ffaef
-
SHA256
cf8256c7a0bca0cb1c1159694bf4d43d936574c89c17ff8efc785c4780b886bf
-
SHA512
347d8077d59f2b7f03c4103e28feb3cccceaa212719feb7af7790a3503300a8402d1bdc125c29f04dbe7e2b06fc09cc202d8509e37ac6fc444a69e33f8c6724f
-
SSDEEP
6144:6XIktXfM8Lv86r9uVWAa2je4Z5zl4hgDHQQs4NTQjoHFsAOZZDAXYcN:6X7tPMK8ctGe4Dzl4h2QnuPs/ZD
Score1/10 -