General
-
Target
PO850.exe
-
Size
1.3MB
-
Sample
241124-hxjq8syqgx
-
MD5
a4337c13c84999f28c2a89eea377b552
-
SHA1
452b87fbb0c08267c24fee1e7aa9d83293086ebb
-
SHA256
445d12c6ebab2592a1630ad5777c3dfbba2b1397eca259e3e714687e8d1dd1b6
-
SHA512
917b6da32d0630f76f70189230dc0bf76138072c7ddc296382c1f3b0ebebcf37860fd328b825758e96f174f921b79887107c187ee2fe5922cb475f0757a4b758
-
SSDEEP
24576:Vtb20pkaCqT5TBWgNQ7afcl+1K7rDLc6Z7uRdhkW6Clt6A:GVg5tQ7afclj7rDxyREW6W5
Static task
static1
Behavioral task
behavioral1
Sample
PO850.exe
Resource
win7-20240903-en
Malware Config
Extracted
remcos
money
79.110.49.250:4190
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-FU0Z08
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
PO850.exe
-
Size
1.3MB
-
MD5
a4337c13c84999f28c2a89eea377b552
-
SHA1
452b87fbb0c08267c24fee1e7aa9d83293086ebb
-
SHA256
445d12c6ebab2592a1630ad5777c3dfbba2b1397eca259e3e714687e8d1dd1b6
-
SHA512
917b6da32d0630f76f70189230dc0bf76138072c7ddc296382c1f3b0ebebcf37860fd328b825758e96f174f921b79887107c187ee2fe5922cb475f0757a4b758
-
SSDEEP
24576:Vtb20pkaCqT5TBWgNQ7afcl+1K7rDLc6Z7uRdhkW6Clt6A:GVg5tQ7afclj7rDxyREW6W5
-
Remcos family
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-