General
-
Target
6910c4915fa2d986a3f33c072265e418db69bb0b0e4d799f0d08937d41cf4931
-
Size
3.1MB
-
Sample
241116-sjm7lsydrl
-
MD5
3d1c583a6ce577bf36898f4376254271
-
SHA1
2ee26d61168c9ec5c1836374c21b750ce3dc6907
-
SHA256
6910c4915fa2d986a3f33c072265e418db69bb0b0e4d799f0d08937d41cf4931
-
SHA512
2d46ff953c011db353a884fc2f9b87bc094af7c364843e2cef0884fe02ebfce125d1f2ed4f6a2134c7a96aba78422ec71245351283e165c5b441c2c63af33610
-
SSDEEP
12288:HqL/BxdXQ3U5wi2ElUXfO1V/r6UgnrbhZQ9fcvsQq8W+ZPDCjWEQlkPbABdXlUgn:HwpXQ3USdUOPnrFa9fWW+7CPbAD1q0
Static task
static1
Behavioral task
behavioral1
Sample
6910c4915fa2d986a3f33c072265e418db69bb0b0e4d799f0d08937d41cf4931.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6910c4915fa2d986a3f33c072265e418db69bb0b0e4d799f0d08937d41cf4931.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
remcos
RemoteHost
www.ogc-oman.com:2404
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcthfufn
-
mouse_option
false
-
mutex
Rmc-KCC3QZ
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
6910c4915fa2d986a3f33c072265e418db69bb0b0e4d799f0d08937d41cf4931
-
Size
3.1MB
-
MD5
3d1c583a6ce577bf36898f4376254271
-
SHA1
2ee26d61168c9ec5c1836374c21b750ce3dc6907
-
SHA256
6910c4915fa2d986a3f33c072265e418db69bb0b0e4d799f0d08937d41cf4931
-
SHA512
2d46ff953c011db353a884fc2f9b87bc094af7c364843e2cef0884fe02ebfce125d1f2ed4f6a2134c7a96aba78422ec71245351283e165c5b441c2c63af33610
-
SSDEEP
12288:HqL/BxdXQ3U5wi2ElUXfO1V/r6UgnrbhZQ9fcvsQq8W+ZPDCjWEQlkPbABdXlUgn:HwpXQ3USdUOPnrFa9fWW+7CPbAD1q0
Score10/10-
Remcos family
-
Suspicious use of SetThreadContext
-