General
-
Target
2024-10-11_af19f3633507a5fb8e1383bd25d68384_avoslocker_hijackloader_rhadamanthys
-
Size
10.0MB
-
Sample
241011-h4bzzawhmj
-
MD5
af19f3633507a5fb8e1383bd25d68384
-
SHA1
b87d24bd8c922ce6d94fc489327dbbf5023b661a
-
SHA256
65d074caa3e234445ad29db1ed6977855f4952c2d025c109f8190631dd6487c6
-
SHA512
7a2c4ba4fc4aaa85249afd7a6098d306a960d2a3ea7f7ee0ca4e712347296e1a11936f76ac997dfd0a2af65777639381da4bfea83bbf8a855855818a967bbdaa
-
SSDEEP
98304:h3x3FJ58yNV78P06ZKlCOQhrAMSVV+uKIqKZCoErQ:h31H5nUICDNuKIqKW
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-11_af19f3633507a5fb8e1383bd25d68384_avoslocker_hijackloader_rhadamanthys.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-10-11_af19f3633507a5fb8e1383bd25d68384_avoslocker_hijackloader_rhadamanthys.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
remcos
UBANCOL
juanruizpu1405.con-ip.com:1668
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-OWARH1
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
2024-10-11_af19f3633507a5fb8e1383bd25d68384_avoslocker_hijackloader_rhadamanthys
-
Size
10.0MB
-
MD5
af19f3633507a5fb8e1383bd25d68384
-
SHA1
b87d24bd8c922ce6d94fc489327dbbf5023b661a
-
SHA256
65d074caa3e234445ad29db1ed6977855f4952c2d025c109f8190631dd6487c6
-
SHA512
7a2c4ba4fc4aaa85249afd7a6098d306a960d2a3ea7f7ee0ca4e712347296e1a11936f76ac997dfd0a2af65777639381da4bfea83bbf8a855855818a967bbdaa
-
SSDEEP
98304:h3x3FJ58yNV78P06ZKlCOQhrAMSVV+uKIqKZCoErQ:h31H5nUICDNuKIqKW
Score10/10-
Adds Run key to start application
-