General
-
Target
q.zip
-
Size
748KB
-
Sample
240719-xlxlaavemr
-
MD5
cfdb60fdfbaddabe855a8155beac3d2c
-
SHA1
607144d74ec2649827742f75fda9316cc5bd971f
-
SHA256
ea24cdf305d29c92c00373c82adb6e2d7ba7b39f10ed38639dc7213646db387f
-
SHA512
cc307f4b46ffc266eb3df4022814f04e7ce0ded0b6264be41831ffdc256489da016c298d15cd620e4d16387b1e6ad2e134e95756d5468d269a11717d72d462c0
-
SSDEEP
12288:Q+Hgy4+G2Z9mK42LaCPK0G1iP1XlEq6L0UA9IpZUKWh:4yD9mKtadHYP1Vo0f9vh
Static task
static1
Malware Config
Extracted
remcos
Start
185.196.9.78:24041
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
log.dat
-
keylog_flag
false
-
keylog_folder
System01
-
mouse_option
false
-
mutex
Rmcxyz1-AEDW2I
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
q.exe
-
Size
235.0MB
-
MD5
9d69951fc27ef094711b73b4fb9122f3
-
SHA1
f3f1efde097ce43cfbf8f7f930f0cbd01706308e
-
SHA256
cd8feea0f7e72c63471e04dfce0338d3f4e79180612123115797bf81b41385db
-
SHA512
9a9972e5002cd5fbde7f5bbb829b91ee11c496e40e4b25d5a086cb346d7d9c04f0728040edf09eb41f4b61e88e3fec21e5ab2d10f1e78f6ab594a7a65666ad44
-
SSDEEP
12288:z7unY+Dl5SVuzB4w0I/zPzsuQ7SpCtqFyR4vToU:PunY+akzB4wb/zn0fQFc47h
-
Executes dropped EXE
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-