General
-
Target
2265eb3c65dff71ed9aba3048f1d4d3cc87626da9ec18f5973d6278395d8ff7b
-
Size
884KB
-
Sample
240911-dgrdxszfqg
-
MD5
2c51e06abff1bd9a467d3b0b36d4e157
-
SHA1
16bc1e9a35c448ef268ae275049634d5697b9ba6
-
SHA256
2265eb3c65dff71ed9aba3048f1d4d3cc87626da9ec18f5973d6278395d8ff7b
-
SHA512
f44e04377c5bd1be65dab115fce354fbe257dca38143da0e617eda92bad0abb706b6e7107cb199de15e2d43f8c47a5964413ed7229b5478bd32bda4872e8c030
-
SSDEEP
24576:PcU0ml7dafY9lsCtgJEQVYD3sNsASMDvMNOSm:kU0EBBlpgusNskSOh
Static task
static1
Behavioral task
behavioral1
Sample
Order.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Order.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
remcos
RemoteHost
198.12.81.159:2560
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-3KTH9T
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
Order.exe
-
Size
980KB
-
MD5
dbf4514b992e86148170b073c34ce18d
-
SHA1
3df7fdba8af689ba6182556d7c68f2069e6cdb13
-
SHA256
f16c023a6032325bd87287d9da6176a49e0b4a278a3b5e6c5d39d1b17711c86f
-
SHA512
5a3c72daacd4afa9547c2ee63c1536ae8a040085d91aaf919150a4091800545917bd2d76ba121f6c9bca64026c40668b1ce60108c6632d1bc63fe2eff9cbae93
-
SSDEEP
24576:+PoloFJdaNfU5RmbQrC2s64a04q3/6/MblIbZqj:+AlgvIgRmbQB4DH37Ib
Score10/10-
Suspicious use of SetThreadContext
-