General
-
Target
1136-117-0x0000000000480000-0x00000000014E2000-memory.dmp
-
Size
16.4MB
-
Sample
240925-m46xkaveld
-
MD5
70543649c53e64cab642951ab92ead2c
-
SHA1
0a1ac6b84cdeb9c4647836b209546eb587770721
-
SHA256
2cc4bbf575c52492458cd0012f6ba4d600107a337702b4226c7c91dbfc33d674
-
SHA512
dc670debe2aa2f956e69ddda98772e6834ec9f9e9dd62092dc78e90515b8071f62bf84e560677ccb350e677d04e7ac2c65454fdc86386e74710407f25a655825
-
SSDEEP
6144:xGEP50q/wv8ZWp1f/nnNsk/2FRTqgcnP0DUl3IRCsAOZZWQXwcrvT4:xhP5hwUZEp/nNN/2FR2Lnoes/ZWIT4
Behavioral task
behavioral1
Sample
1136-117-0x0000000000480000-0x00000000014E2000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1136-117-0x0000000000480000-0x00000000014E2000-memory.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
remcos
Rem_doc2
107.173.4.16:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-DSGECX
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
1136-117-0x0000000000480000-0x00000000014E2000-memory.dmp
-
Size
16.4MB
-
MD5
70543649c53e64cab642951ab92ead2c
-
SHA1
0a1ac6b84cdeb9c4647836b209546eb587770721
-
SHA256
2cc4bbf575c52492458cd0012f6ba4d600107a337702b4226c7c91dbfc33d674
-
SHA512
dc670debe2aa2f956e69ddda98772e6834ec9f9e9dd62092dc78e90515b8071f62bf84e560677ccb350e677d04e7ac2c65454fdc86386e74710407f25a655825
-
SSDEEP
6144:xGEP50q/wv8ZWp1f/nnNsk/2FRTqgcnP0DUl3IRCsAOZZWQXwcrvT4:xhP5hwUZEp/nNN/2FR2Lnoes/ZWIT4
Score1/10 -