General
-
Target
2572-1098-0x0000000000400000-0x0000000000482000-memory.dmp
-
Size
520KB
-
Sample
241017-kc3pqatapp
-
MD5
849a0c48e84646dd3a9d66a6f2268a53
-
SHA1
1fa3fe687ae4d222884f6b073b08b206a90166e7
-
SHA256
f6e2039aefe9f6509f20c3623f193daf533447012d8375f77516304283044251
-
SHA512
5e3a45714c7faae93e5922b646345c0b3d2737a082a6c95b7f66a0b0a72cb213284bb4a709b808a2e5d1de7f5a44df0a7d1246c4ff5e8f954a4a383618f6d892
-
SSDEEP
12288:QTlrYw1RUh3NFn+N5WfIQbjbs/ZXwqT4:gpRUh3NDfIQbjeZ
Behavioral task
behavioral1
Sample
2572-1098-0x0000000000400000-0x0000000000482000-memory.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2572-1098-0x0000000000400000-0x0000000000482000-memory.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
remcos
makuo
remmyc.duckdns.org:57155
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-82JTYR
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
2572-1098-0x0000000000400000-0x0000000000482000-memory.dmp
-
Size
520KB
-
MD5
849a0c48e84646dd3a9d66a6f2268a53
-
SHA1
1fa3fe687ae4d222884f6b073b08b206a90166e7
-
SHA256
f6e2039aefe9f6509f20c3623f193daf533447012d8375f77516304283044251
-
SHA512
5e3a45714c7faae93e5922b646345c0b3d2737a082a6c95b7f66a0b0a72cb213284bb4a709b808a2e5d1de7f5a44df0a7d1246c4ff5e8f954a4a383618f6d892
-
SSDEEP
12288:QTlrYw1RUh3NFn+N5WfIQbjbs/ZXwqT4:gpRUh3NDfIQbjeZ
Score1/10 -