General
-
Target
8b1fcad83099e1daf3accdb39f68a0bd696b053aadc8472e9008fd027a390404.exe
-
Size
769KB
-
Sample
241110-w39rhavrbj
-
MD5
936079e96cd90d0029f53f772370a11d
-
SHA1
daeb253c32cdc076b4e42b8e51eda74ee9865639
-
SHA256
e25e7e373276c2ee56849be99f4a14a420fc85ad8d35ee13c2a3574524090af3
-
SHA512
4df164c42b1a09a6375438d13d04f5ee7a3fa0fc0aa43eb92dc602e1597fb28a31a3a62d99cce4d252fb2e88aa98cd29413073f1613630d8d86870d95f027361
-
SSDEEP
24576:SMwhYwlRZjfxAyExC8Zx0PARxFWfcFqal/F4X5ZiN:SMwhNlR5xAFZq+WfQiX5u
Static task
static1
Behavioral task
behavioral1
Sample
8b1fcad83099e1daf3accdb39f68a0bd696b053aadc8472e9008fd027a390404.exe
Resource
win7-20240903-en
Malware Config
Extracted
remcos
.9.24
moniepont.dynamic-dns.net:3791
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-BPYLMJ
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
8b1fcad83099e1daf3accdb39f68a0bd696b053aadc8472e9008fd027a390404.exe
-
Size
769KB
-
MD5
936079e96cd90d0029f53f772370a11d
-
SHA1
daeb253c32cdc076b4e42b8e51eda74ee9865639
-
SHA256
e25e7e373276c2ee56849be99f4a14a420fc85ad8d35ee13c2a3574524090af3
-
SHA512
4df164c42b1a09a6375438d13d04f5ee7a3fa0fc0aa43eb92dc602e1597fb28a31a3a62d99cce4d252fb2e88aa98cd29413073f1613630d8d86870d95f027361
-
SSDEEP
24576:SMwhYwlRZjfxAyExC8Zx0PARxFWfcFqal/F4X5ZiN:SMwhNlR5xAFZq+WfQiX5u
-
Remcos family
-
Blocklisted process makes network request
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-