General
-
Target
8c9ac2e3ac34a79bbb63a595b2d59dbaa3b1885af2b4f04f2e0dcd7459c5b51a
-
Size
881KB
-
Sample
240724-m88xqatbkm
-
MD5
d89026b08048ee33e1ad4f7c05a06af2
-
SHA1
9372d80eca5ba50ff91460afc30039da05e8f344
-
SHA256
8c9ac2e3ac34a79bbb63a595b2d59dbaa3b1885af2b4f04f2e0dcd7459c5b51a
-
SHA512
9a7195d1d2f0aeb5ea57d245b436f8c1bb8f9515b5f369e082dd3426bb285c0fa3633e5f05790cf2e7979fe7728ebc22fda35bcf7dc7743b26d1e0112a92afae
-
SSDEEP
24576:vIgJGO4svhCiON8BNnlMO/9idgjUSQWCnOlgLd:oTu3OOv7w0UdWIOe
Static task
static1
Behavioral task
behavioral1
Sample
48bc32a1d2d84b7c3f61d1839972c2d36b14d3ab30270cad4cbb4d3b04205407.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
48bc32a1d2d84b7c3f61d1839972c2d36b14d3ab30270cad4cbb4d3b04205407.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
remcos
RemoteHost
ocservice.duckdns.org:6622
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
evferf
-
mouse_option
false
-
mutex
Rmc-5U6QT9
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
48bc32a1d2d84b7c3f61d1839972c2d36b14d3ab30270cad4cbb4d3b04205407.exe
-
Size
1.3MB
-
MD5
b30be2bc141cfd8968a7a04c9829f9e6
-
SHA1
b34742a5ccae99ca650eb7b9b15e8e709a5a0e09
-
SHA256
48bc32a1d2d84b7c3f61d1839972c2d36b14d3ab30270cad4cbb4d3b04205407
-
SHA512
a272dc996e320df1d7b4f58274ce8ed3e9e94bc0c6eaaab543b6620014f745307ee4e7ba32dcbfca380a9f488f2849ada24bbe5805015b3a6c8afd313bb8432d
-
SSDEEP
24576:wAHnh+eWsN3skA4RV1Hom2KXMmHamxu8cYi4BzzaYOiNvKGW5:nh+ZkldoPK8YamxBcY3Bfa0Ny3
Score10/10-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-