General
-
Target
707c1fb31deb005df540fcfb7543cab27de3a170ff5a9174c177170b02d7fa4b.dll
-
Size
45.1MB
-
Sample
241204-rnzwjaxqgw
-
MD5
079e7f12cf3682838b344c095027b69b
-
SHA1
6c827d4537ccdbc6099986c734dc9b266355d843
-
SHA256
707c1fb31deb005df540fcfb7543cab27de3a170ff5a9174c177170b02d7fa4b
-
SHA512
9b266b7416533babf2663cc06c0105ce2bde82c41d2b6705c1146fbe8ddad097965cbed80d10987dc0e3acf763dce29d0379ac9fb45c08b03dc9ea045e4c8bcd
-
SSDEEP
786432:mUP7GCGO7t0Srkx/tC0SzIdSwh/WxbpNHQD3trzRpY:mUP7GCG6iSrkx1hSzYsHQD3t/Re
Static task
static1
Behavioral task
behavioral1
Sample
707c1fb31deb005df540fcfb7543cab27de3a170ff5a9174c177170b02d7fa4b.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
707c1fb31deb005df540fcfb7543cab27de3a170ff5a9174c177170b02d7fa4b.dll
Resource
win10v2004-20241007-en
Malware Config
Extracted
remcos
RemoteHost
pattreon.duckdns.org:7035
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-IHZUHP
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
707c1fb31deb005df540fcfb7543cab27de3a170ff5a9174c177170b02d7fa4b.dll
-
Size
45.1MB
-
MD5
079e7f12cf3682838b344c095027b69b
-
SHA1
6c827d4537ccdbc6099986c734dc9b266355d843
-
SHA256
707c1fb31deb005df540fcfb7543cab27de3a170ff5a9174c177170b02d7fa4b
-
SHA512
9b266b7416533babf2663cc06c0105ce2bde82c41d2b6705c1146fbe8ddad097965cbed80d10987dc0e3acf763dce29d0379ac9fb45c08b03dc9ea045e4c8bcd
-
SSDEEP
786432:mUP7GCGO7t0Srkx/tC0SzIdSwh/WxbpNHQD3trzRpY:mUP7GCG6iSrkx1hSzYsHQD3t/Re
Score10/10-
Remcos family
-
Adds Run key to start application
-
Suspicious use of NtCreateThreadExHideFromDebugger
-