General
-
Target
ed8b3713eb5e99e89d8c25e0cf1a1c9c.bin
-
Size
830KB
-
Sample
240916-bvqcnssgjl
-
MD5
bf7762e3915c96478632f89211bc1e3e
-
SHA1
0db3d1918379111682c001c0b2fbdbbcb7a40cee
-
SHA256
25fd4cd243caf6ac3e7e66c7bd9f5ad3de94d52d4cec438ecd4f596429ddd0ae
-
SHA512
d6542e1758388551d8a8ef3cc64969a54bc31d24984d23af6094a68fc971629711f17658011df8b068deb389f041ae3d895fe9c0ae2dc26e44fc85220e4b76b0
-
SSDEEP
12288:o3dOeDGR21tSSiDZRAv4+h9fCeheSvb0dRaFPHs96men2/WpSRQRXkaoznY:1CF/iMvHbCehp0yFP+6menDAQqzY
Static task
static1
Behavioral task
behavioral1
Sample
RFQ 412.24 10.09.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
RFQ 412.24 10.09.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
remcos
RemoteHost
127.0.0.1:52121
officerem.duckdns.org:52121
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-6GPUH1
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
RFQ 412.24 10.09.exe
-
Size
1.8MB
-
MD5
9aefd01233c746cdcfb120001a2defd2
-
SHA1
599bb60793602a6fd2fae402dfc06d22d5a4a868
-
SHA256
97d26e3c4d9c3fffe1a29eb0ef84681bb843cd06223d84bc947185107be4bba0
-
SHA512
c4c072728ac7f12c127688f189f17201d3837e62d25cd6e6aca3f002c3182aa3374535cfc04b364fe944794a6058d09cb49ec7387ae3a731e37fbbb12800d425
-
SSDEEP
24576:2BuCDJRpDyeGykCiwDbdStLd+1yvNF2qU:2BDrxDGhDyFr
Score10/10-
Suspicious use of SetThreadContext
-