General
-
Target
4b1940d1d48da34c2bd0d60403181786.tar
-
Size
15.2MB
-
Sample
241114-w19zgs1lhy
-
MD5
4b1940d1d48da34c2bd0d60403181786
-
SHA1
78ddadb5453d7c53c27e344c81177272b43e84d8
-
SHA256
e5203f6c2432034e7a18f9580294f5ca3276820f9c3d6dfdcada441c14784fc2
-
SHA512
3c72c9867bec19f88a8d3e41249188e84d7e3462aef060f9e883266c101d95eae86999c2425366b06a54803a28c34662f063362f0c3db35dc44456d007b7d828
-
SSDEEP
393216:7x8jDlChSbcoC8EnDpIiBsRdJihMHviBbpZ32:NgamdEnlIqs/fHKBNZ32
Static task
static1
Behavioral task
behavioral1
Sample
3082-INSTANCIA No. 7590-2024..exe
Resource
win7-20241010-en
Malware Config
Extracted
remcos
DOLAR
noviembre12.ydns.eu:2708
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-AZY5JK
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
3082-INSTANCIA No. 7590-2024..exe
-
Size
15.3MB
-
MD5
7c8b84ef9f4ddd9664444e41ab71e713
-
SHA1
438ac22d66dcaf80b40742662ebec0d763798b94
-
SHA256
7c0a151ef239e3c41940ed72090a25bb56cf4c6574893e17dab9067f54038993
-
SHA512
6ae69dbaa14990ec8bd0a49fb994c4243e8a94bf0cb684c36cc3623bf7766e5c44e7fd8de7da65463a2584ac312dcee03bca0114daec265ecdaf81dbd97406d9
-
SSDEEP
393216:c3LHzaNYYRs5r1/YVY6EynEoBruKzONBIud4KOaq90Y:c3LeNYYZSKnESFZKzqF
-
Remcos family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Drops startup file
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-