General
-
Target
a7ba697a85c7f566061f884edac486b7a6a226f0021fec20f04c1071c9be20c9
-
Size
869KB
-
Sample
241122-nbs1nszjhy
-
MD5
2faedba9ac734c0d13cdcaba629f92e9
-
SHA1
57064b0b45968bdf01e7c82b33e085a1063f504d
-
SHA256
a7ba697a85c7f566061f884edac486b7a6a226f0021fec20f04c1071c9be20c9
-
SHA512
b7a00a89efbd095d85dd24b18eb79fbd107f600120101cad4dc6367791271858e009433add39cd1426dd7e431c3ede8e8ba18af76625d0e112744f10f901792e
-
SSDEEP
24576:XYQBzDbUZClmjB0w+pT+1K77Dle6ZjYhlhkW+gT/K:XZDbUZfBIpTj77DzchsW+qC
Static task
static1
Behavioral task
behavioral1
Sample
PO850.exe
Resource
win7-20240903-en
Malware Config
Extracted
remcos
money
79.110.49.250:4190
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-FU0Z08
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
PO850.exe
-
Size
1.3MB
-
MD5
a4337c13c84999f28c2a89eea377b552
-
SHA1
452b87fbb0c08267c24fee1e7aa9d83293086ebb
-
SHA256
445d12c6ebab2592a1630ad5777c3dfbba2b1397eca259e3e714687e8d1dd1b6
-
SHA512
917b6da32d0630f76f70189230dc0bf76138072c7ddc296382c1f3b0ebebcf37860fd328b825758e96f174f921b79887107c187ee2fe5922cb475f0757a4b758
-
SSDEEP
24576:Vtb20pkaCqT5TBWgNQ7afcl+1K7rDLc6Z7uRdhkW6Clt6A:GVg5tQ7afclj7rDxyREW6W5
-
Remcos family
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-