General
-
Target
1908-19-0x0000000000400000-0x0000000000482000-memory.dmp
-
Size
520KB
-
Sample
240930-leq95sxemp
-
MD5
d95abee7e9b228595a8dfbbf9a23d817
-
SHA1
7ca2e581454c288db1d3a0a7023af8a22b671d52
-
SHA256
b0937838dc41174ef07d016b62f4cca04385a7a49c4b5b159ee1c446d59f6d59
-
SHA512
0cabab5d6f75faa177755acac6ebdb97e0230d2cda2dfda0be4e116c2cef6fc98e9438b247cd31002cfc8003354451ceaca88ddf98a48fd61db26c468fe14323
-
SSDEEP
6144:bTz+c6KHYBhDc1RGJdv//NkUn+N5Bkf/0TELRvIZCjbsAOZZmAX4cr5T4:bTlrYw1RUh3NFn+N5WfIQxjbs/ZmuT4
Behavioral task
behavioral1
Sample
1908-19-0x0000000000400000-0x0000000000482000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1908-19-0x0000000000400000-0x0000000000482000-memory.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
remcos
RemoteHost
103.186.116.220:6565
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-9XV80Z
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
1908-19-0x0000000000400000-0x0000000000482000-memory.dmp
-
Size
520KB
-
MD5
d95abee7e9b228595a8dfbbf9a23d817
-
SHA1
7ca2e581454c288db1d3a0a7023af8a22b671d52
-
SHA256
b0937838dc41174ef07d016b62f4cca04385a7a49c4b5b159ee1c446d59f6d59
-
SHA512
0cabab5d6f75faa177755acac6ebdb97e0230d2cda2dfda0be4e116c2cef6fc98e9438b247cd31002cfc8003354451ceaca88ddf98a48fd61db26c468fe14323
-
SSDEEP
6144:bTz+c6KHYBhDc1RGJdv//NkUn+N5Bkf/0TELRvIZCjbsAOZZmAX4cr5T4:bTlrYw1RUh3NFn+N5WfIQxjbs/ZmuT4
Score1/10 -