General
-
Target
2896-30-0x0000000000400000-0x000000000047F000-memory.dmp
-
Size
508KB
-
Sample
241112-jr6t9a1mfn
-
MD5
9474c6dc0c8fd5ced6f151ff33b32352
-
SHA1
5ac74e7f1fbc50bca74fa12221f00ec7a28d91de
-
SHA256
1619dddea4352915dd92edd9ef4e32f1a12a2b87b34e18669d76083d2493f81e
-
SHA512
2dd4360734bbc792e2ada5dc9bf29873c512be0718206ccb38a06823f6289fbea182a218ff093e4da626631b53f1ea882be55169bb4c32d37ce8a69ac19139e9
-
SSDEEP
12288:nuD09AUkNIGBYYv4eK13x13nZHSRVMf139F5wIB7+IwtHwBtVAbesvZDSO+DY:a09AfNIEYsunZvZO9Zxs
Behavioral task
behavioral1
Sample
2896-30-0x0000000000400000-0x000000000047F000-memory.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2896-30-0x0000000000400000-0x000000000047F000-memory.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
remcos
RemoteHost
172.245.123.14:2404
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-3DXQCZ
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
2896-30-0x0000000000400000-0x000000000047F000-memory.dmp
-
Size
508KB
-
MD5
9474c6dc0c8fd5ced6f151ff33b32352
-
SHA1
5ac74e7f1fbc50bca74fa12221f00ec7a28d91de
-
SHA256
1619dddea4352915dd92edd9ef4e32f1a12a2b87b34e18669d76083d2493f81e
-
SHA512
2dd4360734bbc792e2ada5dc9bf29873c512be0718206ccb38a06823f6289fbea182a218ff093e4da626631b53f1ea882be55169bb4c32d37ce8a69ac19139e9
-
SSDEEP
12288:nuD09AUkNIGBYYv4eK13x13nZHSRVMf139F5wIB7+IwtHwBtVAbesvZDSO+DY:a09AfNIEYsunZvZO9Zxs
Score1/10 -