General
-
Target
744-674-0x0000000000460000-0x00000000016B4000-memory.dmp
-
Size
18.3MB
-
Sample
241009-m4kpbsshkk
-
MD5
d0a85b2e1983c74f2bc3b0fa7de313cc
-
SHA1
f1682ab0ae370af2faf4fbac67af2b34dab1686d
-
SHA256
3f630487a48c5cd1d7a28e0e7cc805453bbec63a7cf0e0a50c7916339b68047e
-
SHA512
74af5f7d8e5bbfa2df8046e6fe0760e2fe82cee736e781bef8677e315d44658d09e31e3bc5423cfa68ad9057ec51a0a11823306c22acacc278e9fa5c1183d7bd
-
SSDEEP
6144:mMCw+t+NuXS5j/3hl6gpcDvF+pnUT0nhsvb2pRhsAOZZbAXUzcnpT4:mp3+sX8TxlvpcDvgpkgpRhs/ZbcT4
Behavioral task
behavioral1
Sample
744-674-0x0000000000460000-0x00000000016B4000-memory.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
744-674-0x0000000000460000-0x00000000016B4000-memory.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
remcos
RemoteHost
kezdns.pro:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-FUHBXG
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
744-674-0x0000000000460000-0x00000000016B4000-memory.dmp
-
Size
18.3MB
-
MD5
d0a85b2e1983c74f2bc3b0fa7de313cc
-
SHA1
f1682ab0ae370af2faf4fbac67af2b34dab1686d
-
SHA256
3f630487a48c5cd1d7a28e0e7cc805453bbec63a7cf0e0a50c7916339b68047e
-
SHA512
74af5f7d8e5bbfa2df8046e6fe0760e2fe82cee736e781bef8677e315d44658d09e31e3bc5423cfa68ad9057ec51a0a11823306c22acacc278e9fa5c1183d7bd
-
SSDEEP
6144:mMCw+t+NuXS5j/3hl6gpcDvF+pnUT0nhsvb2pRhsAOZZbAXUzcnpT4:mp3+sX8TxlvpcDvgpkgpRhs/ZbcT4
Score1/10 -