General
-
Target
4184-5-0x0000000000400000-0x0000000001400000-memory.dmp
-
Size
16.0MB
-
Sample
240522-xjrl9acf9t
-
MD5
c8bb68a7007379ff3b22d5717c928135
-
SHA1
dfe5ab950e92db39021635bcba4ef066a236f2f2
-
SHA256
b9a2c42b5233f76efc16d3ce2512596c4c8aa1d3363b6b452783e5e36f619d72
-
SHA512
9487332acbdf73da08f857fcc95791eea4b396fae2463b15761476e7018e7d6f6ef6ab3ec787a3cac84423dc588514e057695779447dd79710eef91c33e05a0b
-
SSDEEP
49152:eAQuyZ5AQuyZb+SIJsL0TGn1vQhZM6bl/mtUBNTJjm:e7uK7ulKISnq/BwUpjm
Behavioral task
behavioral1
Sample
4184-5-0x0000000000400000-0x0000000001400000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4184-5-0x0000000000400000-0x0000000001400000-memory.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
remcos
kc FILE
91.223.3.151:4508
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-6ZM3S3
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
4184-5-0x0000000000400000-0x0000000001400000-memory.dmp
-
Size
16.0MB
-
MD5
c8bb68a7007379ff3b22d5717c928135
-
SHA1
dfe5ab950e92db39021635bcba4ef066a236f2f2
-
SHA256
b9a2c42b5233f76efc16d3ce2512596c4c8aa1d3363b6b452783e5e36f619d72
-
SHA512
9487332acbdf73da08f857fcc95791eea4b396fae2463b15761476e7018e7d6f6ef6ab3ec787a3cac84423dc588514e057695779447dd79710eef91c33e05a0b
-
SSDEEP
49152:eAQuyZ5AQuyZb+SIJsL0TGn1vQhZM6bl/mtUBNTJjm:e7uK7ulKISnq/BwUpjm
Score1/10 -