General
-
Target
2836-32-0x0000000000400000-0x0000000000482000-memory.dmp
-
Size
520KB
-
Sample
241004-g68laaygkq
-
MD5
50a4cd431c2c23564d0badfa315a2cbc
-
SHA1
5f5eb63dec9ef5504c936ebc7c19b855b13cb298
-
SHA256
b043f6c829659a81f31b3bd63acf32cb75ecee7eefc6956cb4baf98b524c54a5
-
SHA512
aa650efc0943f59019509fe3bd3395518fc98459b10c8144fe3dcddd49cf09a35d1e412af7d7310e0320aa9db74ebfade719b4b7756be7543422e5e743e1b90c
-
SSDEEP
6144:EXIktXfM8Lv86r9uVWAa2je4Z5zl4hgDHQQs4NTQjoHScsAOZZoAX0cN55Gv:EX7tPMK8ctGe4Dzl4h2QnuEcs/ZoEcv
Behavioral task
behavioral1
Sample
2836-32-0x0000000000400000-0x0000000000482000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2836-32-0x0000000000400000-0x0000000000482000-memory.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
remcos
IRN
irnserv1.ddns.net:4424
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-CA8761
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
2836-32-0x0000000000400000-0x0000000000482000-memory.dmp
-
Size
520KB
-
MD5
50a4cd431c2c23564d0badfa315a2cbc
-
SHA1
5f5eb63dec9ef5504c936ebc7c19b855b13cb298
-
SHA256
b043f6c829659a81f31b3bd63acf32cb75ecee7eefc6956cb4baf98b524c54a5
-
SHA512
aa650efc0943f59019509fe3bd3395518fc98459b10c8144fe3dcddd49cf09a35d1e412af7d7310e0320aa9db74ebfade719b4b7756be7543422e5e743e1b90c
-
SSDEEP
6144:EXIktXfM8Lv86r9uVWAa2je4Z5zl4hgDHQQs4NTQjoHScsAOZZoAX0cN55Gv:EX7tPMK8ctGe4Dzl4h2QnuEcs/ZoEcv
Score1/10 -