General
-
Target
568-64-0x0000000000280000-0x00000000012E2000-memory.dmp
-
Size
16.4MB
-
Sample
241125-g6az1syqej
-
MD5
bdaf9ac6c1f8b976c4fc8a78150bca57
-
SHA1
494db460cf4ab85373f79408c8da39c01e08e900
-
SHA256
14c9b5664390037b713c243c96bc1e199254f45f286e359e8733895abf522ba9
-
SHA512
2f72eb434c142bd50811f978d16cb1bd8010fd788cf29b6d277b8132896c00ddbd262f21529731e2c4a5f21756418b38a4c815d2f563bc2e294f2ec13d4cffd5
-
SSDEEP
12288:4h7QJe5EJvNtfWlxeHiPkcYzcCs/ZRJT4:YR5EJvNTHiPRYYJZ
Behavioral task
behavioral1
Sample
568-64-0x0000000000280000-0x00000000012E2000-memory.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
568-64-0x0000000000280000-0x00000000012E2000-memory.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
remcos
RemoteHost
154.216.18.157:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-N639VY
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
568-64-0x0000000000280000-0x00000000012E2000-memory.dmp
-
Size
16.4MB
-
MD5
bdaf9ac6c1f8b976c4fc8a78150bca57
-
SHA1
494db460cf4ab85373f79408c8da39c01e08e900
-
SHA256
14c9b5664390037b713c243c96bc1e199254f45f286e359e8733895abf522ba9
-
SHA512
2f72eb434c142bd50811f978d16cb1bd8010fd788cf29b6d277b8132896c00ddbd262f21529731e2c4a5f21756418b38a4c815d2f563bc2e294f2ec13d4cffd5
-
SSDEEP
12288:4h7QJe5EJvNtfWlxeHiPkcYzcCs/ZRJT4:YR5EJvNTHiPRYYJZ
Score1/10 -