General
-
Target
1764-13-0x0000000027D00000-0x0000000028D00000-memory.dmp
-
Size
16.0MB
-
Sample
240517-nyh4zsgc33
-
MD5
04ca1e20b9e9ec4a3eca8ccc9fcf0c1b
-
SHA1
c5fd41618cd47967816834113312f9b6e2ab4a89
-
SHA256
59710e2f1f540113e5f86cf4915e7c5edb8e9273c7ffdbceb2c0ba54d75bbbaa
-
SHA512
0d5fde97abd29f865254de55c95c24c8c7c67e2da630b4f1cab22c42e75c0e9647780f8defcffa0fbe61e32aeb27e57269ec1c38a684f5d6ea493695d15ac0d1
-
SSDEEP
12288:NPmUhjREy9R04jE0IsWGovEDbxQs/Z3Xcv:Jrj6IR04jEXsxbx7Z
Behavioral task
behavioral1
Sample
1764-13-0x0000000027D00000-0x0000000028D00000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1764-13-0x0000000027D00000-0x0000000028D00000-memory.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
remcos
FmGlobal
royaldachpharmacy.duckdns.org:6395
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
services.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-GRT17F
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
1764-13-0x0000000027D00000-0x0000000028D00000-memory.dmp
-
Size
16.0MB
-
MD5
04ca1e20b9e9ec4a3eca8ccc9fcf0c1b
-
SHA1
c5fd41618cd47967816834113312f9b6e2ab4a89
-
SHA256
59710e2f1f540113e5f86cf4915e7c5edb8e9273c7ffdbceb2c0ba54d75bbbaa
-
SHA512
0d5fde97abd29f865254de55c95c24c8c7c67e2da630b4f1cab22c42e75c0e9647780f8defcffa0fbe61e32aeb27e57269ec1c38a684f5d6ea493695d15ac0d1
-
SSDEEP
12288:NPmUhjREy9R04jE0IsWGovEDbxQs/Z3Xcv:Jrj6IR04jEXsxbx7Z
Score1/10 -