General
-
Target
1ff525639971954f7b8f90e599b8ad269b40b6d34a074e18e5f44bf0f85a0a85
-
Size
1.9MB
-
Sample
241129-k49bksxkcz
-
MD5
0f116a860d055461e73e35536787c02f
-
SHA1
fb7b079ca9599aa530920ce445cc33cdc4f62883
-
SHA256
1ff525639971954f7b8f90e599b8ad269b40b6d34a074e18e5f44bf0f85a0a85
-
SHA512
c7ad85c56568a6c8a3749cdb8030d84d3830f1c23448472bc6255dec8dfab5205e462cb2f7990a019e9885718f9d040a442638f66f33da5509e2c68508614b20
-
SSDEEP
49152:xVg5tQ7a/05spYndBKm6SJxKogrSWzWZ6+2ULK5:/g565hJJAWWKZ6+Z
Static task
static1
Behavioral task
behavioral1
Sample
1ff525639971954f7b8f90e599b8ad269b40b6d34a074e18e5f44bf0f85a0a85.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1ff525639971954f7b8f90e599b8ad269b40b6d34a074e18e5f44bf0f85a0a85.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
remcos
RemoteHost
162.251.122.86:6644
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-CGA6IQ
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
1ff525639971954f7b8f90e599b8ad269b40b6d34a074e18e5f44bf0f85a0a85
-
Size
1.9MB
-
MD5
0f116a860d055461e73e35536787c02f
-
SHA1
fb7b079ca9599aa530920ce445cc33cdc4f62883
-
SHA256
1ff525639971954f7b8f90e599b8ad269b40b6d34a074e18e5f44bf0f85a0a85
-
SHA512
c7ad85c56568a6c8a3749cdb8030d84d3830f1c23448472bc6255dec8dfab5205e462cb2f7990a019e9885718f9d040a442638f66f33da5509e2c68508614b20
-
SSDEEP
49152:xVg5tQ7a/05spYndBKm6SJxKogrSWzWZ6+2ULK5:/g565hJJAWWKZ6+Z
-
Remcos family
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-