Behavioral task
behavioral1
Sample
4624-32-0x0000000000400000-0x000000000048A000-memory.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4624-32-0x0000000000400000-0x000000000048A000-memory.exe
Resource
win10v2004-20240802-en
General
-
Target
4624-32-0x0000000000400000-0x000000000048A000-memory.dmp
-
Size
552KB
-
MD5
f051c1e4267c283d29a1dc5e07076a44
-
SHA1
ffe07a371439813270696d413ef614b6ea089728
-
SHA256
9eed2f17f4cc00d0a86e9d698ccecc64fb5ef526e6ee0461b7363211d2c0d546
-
SHA512
9381ee4813f3451df6e72d0a22a7de5b5ae17303418c7d5787c0bce733a94c4f231d7f0871dca1e7fcdc357bae1132f2ee50ea9b6895aad00264942e2f4adf43
-
SSDEEP
6144:QXIktXfM8Lv86r9uVWAa2je4Z5zl4hgDHQQs4NTQjoHHjsAOZZoAXmSj6:QX7tPMK8ctGe4Dzl4h2Qnups/ZoD
Malware Config
Extracted
remcos
JULY 24-CRYPT-TOOLS- UJU
myfrontmannysix.ddns.net:4939
backupfrontmanny.duckdns.org:4939
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
dghf.exe
-
copy_folder
uiyk
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%Temp%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
-C0WVI5
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
Files
-
4624-32-0x0000000000400000-0x000000000048A000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 312KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX1 Size: 213KB - Virtual size: 216KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 18KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE