General
-
Target
4668-21-0x00000000334B0000-0x00000000344B0000-memory.dmp
-
Size
16.0MB
-
Sample
240517-jvh8csgh38
-
MD5
74336c32e7c56b674fb126ea9e341303
-
SHA1
f39ef75b56ff98daba01247359f06030b9cb75fa
-
SHA256
c5fd8276a2017e7ee13fb955bf7a7105c87c6d5803f0e866f57634502dc3eedb
-
SHA512
ab82672c061f51c95622f3813391173187156f90b0648598f90430f4c5deffb467b8ca36d4d37462207954500ba30837a413559cced9c2572173718428932208
-
SSDEEP
12288:ZddNMeOAibzWTUCs/D1EZaQNus/ZVjcv:DDOAvUCsQN1Z
Behavioral task
behavioral1
Sample
4668-21-0x00000000334B0000-0x00000000344B0000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4668-21-0x00000000334B0000-0x00000000344B0000-memory.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
remcos
RemoteHost
jazts.duckdns.org:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-AX5VVU
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
4668-21-0x00000000334B0000-0x00000000344B0000-memory.dmp
-
Size
16.0MB
-
MD5
74336c32e7c56b674fb126ea9e341303
-
SHA1
f39ef75b56ff98daba01247359f06030b9cb75fa
-
SHA256
c5fd8276a2017e7ee13fb955bf7a7105c87c6d5803f0e866f57634502dc3eedb
-
SHA512
ab82672c061f51c95622f3813391173187156f90b0648598f90430f4c5deffb467b8ca36d4d37462207954500ba30837a413559cced9c2572173718428932208
-
SSDEEP
12288:ZddNMeOAibzWTUCs/D1EZaQNus/ZVjcv:DDOAvUCsQN1Z
Score1/10 -