General
-
Target
3036-80-0x00000000003E0000-0x0000000001442000-memory.dmp
-
Size
16.4MB
-
Sample
241125-g5w6vstkax
-
MD5
5f04edfd4009c09755796baabcca3168
-
SHA1
f52fd082df63bfe54a4af9556468c267c21a11a3
-
SHA256
afc730032f584e9254d2e45981ee56840dced996446852cc9ea0131336636785
-
SHA512
df9e9d50a0e826410562e671bb9b50b872f4e06516cc05c70d3ea99ef536b73b8ad77db2f50398b436fac514504a460a0d4094d334e3af94442709a01f63caf7
-
SSDEEP
6144:WEaXoBO1WFUNfiprPltZ1SgRkrnlWxXET0vZM3MDsAOZZ1QXacngT4:WpXo4Wsf8751XRkrnoxkMs/Z1FT4
Behavioral task
behavioral1
Sample
3036-80-0x00000000003E0000-0x0000000001442000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3036-80-0x00000000003E0000-0x0000000001442000-memory.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
remcos
RemoteHost
154.216.18.214:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-AOD6MB
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
3036-80-0x00000000003E0000-0x0000000001442000-memory.dmp
-
Size
16.4MB
-
MD5
5f04edfd4009c09755796baabcca3168
-
SHA1
f52fd082df63bfe54a4af9556468c267c21a11a3
-
SHA256
afc730032f584e9254d2e45981ee56840dced996446852cc9ea0131336636785
-
SHA512
df9e9d50a0e826410562e671bb9b50b872f4e06516cc05c70d3ea99ef536b73b8ad77db2f50398b436fac514504a460a0d4094d334e3af94442709a01f63caf7
-
SSDEEP
6144:WEaXoBO1WFUNfiprPltZ1SgRkrnlWxXET0vZM3MDsAOZZ1QXacngT4:WpXo4Wsf8751XRkrnoxkMs/Z1FT4
Score1/10 -