General
-
Target
c0585835beb4bef171c0cf8b15e8d5c5.bin
-
Size
942KB
-
Sample
240905-bzfn2a1hjg
-
MD5
c0ccf02a962f9284e476c1b9ab3e8239
-
SHA1
97374d47ce149e9f1fb918b3f029a6ff1e524cdb
-
SHA256
2341360aa2d0bb8b8017ab7c89d69eed76584d9948c52b325c2eb790be65d25f
-
SHA512
f83a0d72b50f9b46571c033d00414ad468ace31233e2f0eccfbd11c3bbbe9289bca23a2498efcae6b6406ffec0d18ea8eb4243ab0b6e2bc28bdf208789c20203
-
SSDEEP
12288:u1sSQ76No7eU2EOF1UIP1ToCpBrG0Auz7pXSIo6jrRJ3scRqbVNMEwhcKaivmCq/:u1sOFGYPBrclmRJRRqbVNRwhDvm5/
Static task
static1
Behavioral task
behavioral1
Sample
d2d047125f00db9f2a56d34b1e1515ff98e593352c59c5aabbc0ca9888aabb31.exe
Resource
win7-20240903-en
Malware Config
Extracted
remcos
APPO
pronpostavka.com:2559
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
chrome-EZMR6Q
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
d2d047125f00db9f2a56d34b1e1515ff98e593352c59c5aabbc0ca9888aabb31.exe
-
Size
1.4MB
-
MD5
c0585835beb4bef171c0cf8b15e8d5c5
-
SHA1
db8c9c483776385b86676fa2f3d2d5a49d05bae0
-
SHA256
d2d047125f00db9f2a56d34b1e1515ff98e593352c59c5aabbc0ca9888aabb31
-
SHA512
53a4d4e8617327724efe07473c30c0abc83e82ba81b5a0e79317041cca6552be5a6ba202882888bf0516ca5d5b5997d05b4056196192e6256b012cbce131218f
-
SSDEEP
24576:nqDEvCTbMWu7rQYlBQcBiT6rprG8aW+buh+WZiRDus2vcy2iU6Ylcyo2:nTvC/MTQYxsWR7aW+0+EiZccvio
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-