General
-
Target
8280999c6dfd7e79d7b98fcd1158959c.bin
-
Size
827KB
-
Sample
240916-blwhbs1gnb
-
MD5
be04c1ee9d54e155ee15a5dfb7885632
-
SHA1
28ca3da5ab056a4771430c7992ffffc350467faa
-
SHA256
1cb4c6f25f5a95320abfd59dc8440a15422688f1fdf653ddc4e8fa4e43ea0929
-
SHA512
887368438454c40073c484287c3d7e387b4d30f165f13d16e4f1c80783aa8836cf764978a6465c9457d6ed4f07a315505590e3b678c16981b5e73ad7f3fd4a7f
-
SSDEEP
24576:+Kr5DG+d1az4I+h0k345ZDh9cPkM2lFB+at1axyzr+oEfFQtBudjqfw:28Eg+kg5/cPkpB/GxAH32
Static task
static1
Behavioral task
behavioral1
Sample
RFQ 412.24 10.09.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
RFQ 412.24 10.09.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
remcos
RemoteHost
127.0.0.1:52121
officerem.duckdns.org:52121
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-6GPUH1
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
RFQ 412.24 10.09.exe
-
Size
1.8MB
-
MD5
9aefd01233c746cdcfb120001a2defd2
-
SHA1
599bb60793602a6fd2fae402dfc06d22d5a4a868
-
SHA256
97d26e3c4d9c3fffe1a29eb0ef84681bb843cd06223d84bc947185107be4bba0
-
SHA512
c4c072728ac7f12c127688f189f17201d3837e62d25cd6e6aca3f002c3182aa3374535cfc04b364fe944794a6058d09cb49ec7387ae3a731e37fbbb12800d425
-
SSDEEP
24576:2BuCDJRpDyeGykCiwDbdStLd+1yvNF2qU:2BDrxDGhDyFr
Score10/10-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-