General
-
Target
payment receipt copy.bat.exe
-
Size
1.2MB
-
Sample
241124-hs7x9sypfy
-
MD5
1712324115eb0e31f7fa6df81f799315
-
SHA1
626fe2da083fd11d95ed4bdcc4e109284d83d4a2
-
SHA256
02fe0d6de9551efd2f96b35adcb8c709fa40b9413c0a8183073ad0f6b25564dc
-
SHA512
6b2bb24636a5ace2bdc16f081c9ae839623dff197bffa54cbdc6b42f16626c8dc5a1f6673606a4b0144af84f32b15049037801e30309b1e01da3c0b60c26ff4d
-
SSDEEP
24576:lY2YACYOYGYAAYAtY0YHYAkYAtYJYAAYoYA2YnYAqYDYAH46OwoZav/pV8ymXRuX:xLoiVVAREJTXAMQCtMUdRQ9G
Static task
static1
Behavioral task
behavioral1
Sample
payment receipt copy.bat.exe
Resource
win7-20240903-en
Malware Config
Extracted
remcos
21
teebro1800.dynamic-dns.net:2195
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-AJ9FFW
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
payment receipt copy.bat.exe
-
Size
1.2MB
-
MD5
1712324115eb0e31f7fa6df81f799315
-
SHA1
626fe2da083fd11d95ed4bdcc4e109284d83d4a2
-
SHA256
02fe0d6de9551efd2f96b35adcb8c709fa40b9413c0a8183073ad0f6b25564dc
-
SHA512
6b2bb24636a5ace2bdc16f081c9ae839623dff197bffa54cbdc6b42f16626c8dc5a1f6673606a4b0144af84f32b15049037801e30309b1e01da3c0b60c26ff4d
-
SSDEEP
24576:lY2YACYOYGYAAYAtY0YHYAkYAtYJYAAYoYA2YnYAqYDYAH46OwoZav/pV8ymXRuX:xLoiVVAREJTXAMQCtMUdRQ9G
-
Remcos family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Drops startup file
-
Suspicious use of SetThreadContext
-