General
-
Target
2616-33-0x0000000000400000-0x0000000000482000-memory.dmp
-
Size
520KB
-
Sample
240912-nda8mstakc
-
MD5
92cf5b5283de654c0942d19da29b8902
-
SHA1
e0941320fb4aa016569273f16ead709898d082c4
-
SHA256
d32890df56e6b0ed49b84d1ef40f8a931eb5408d38012c50951c7fbd67e848dd
-
SHA512
957d123bb0f19c06a1c1a0695ea6981675bfd1eb681954f59a2c68a0e8450b978bb48b85cd0fa7201cfbd4505221c3b5515383f58b19ae59cac99d93f1bbe983
-
SSDEEP
12288:QTlrYw1RUh3NFn+N5WfIQMjbs/ZB6syT4:gpRUh3NDfIQMjeZ
Behavioral task
behavioral1
Sample
2616-33-0x0000000000400000-0x0000000000482000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2616-33-0x0000000000400000-0x0000000000482000-memory.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
remcos
RemoteHost
eadzagba1.duckdns.org:4877
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-X3UMUO
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
2616-33-0x0000000000400000-0x0000000000482000-memory.dmp
-
Size
520KB
-
MD5
92cf5b5283de654c0942d19da29b8902
-
SHA1
e0941320fb4aa016569273f16ead709898d082c4
-
SHA256
d32890df56e6b0ed49b84d1ef40f8a931eb5408d38012c50951c7fbd67e848dd
-
SHA512
957d123bb0f19c06a1c1a0695ea6981675bfd1eb681954f59a2c68a0e8450b978bb48b85cd0fa7201cfbd4505221c3b5515383f58b19ae59cac99d93f1bbe983
-
SSDEEP
12288:QTlrYw1RUh3NFn+N5WfIQMjbs/ZB6syT4:gpRUh3NDfIQMjeZ
Score1/10 -