General
-
Target
DEMANDA JUDICIAL.Uue.Uue
-
Size
581KB
-
Sample
241206-y34llavqgw
-
MD5
9d6194a1a8eb592a8b2232b8daea6fc5
-
SHA1
23c62ca8fe105fb75124f13c12848120d8d80fbc
-
SHA256
dc33f57722e95a9bdf83e9f918d96ce3d89832b62fb8c142243092367080cb34
-
SHA512
dec81dc5610b2d694a09b39a588db56ed02f603609fbe955f74698762938b407d733e4626b3388983b86caa9c894882cc355fedd9463f3e6112ecf24ca417858
-
SSDEEP
12288:nJzZ1mX5OG0l11ymLRhBZT74WA8iMMj7U1liGou6NsiTIJKQa1StJliH7:n9Z18oGO1fLLBZTkntFino+iT2KQ9tc7
Static task
static1
Behavioral task
behavioral1
Sample
DAÑOS Y PERJUICIO/DEMANDA JUDICIAL.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
DAÑOS Y PERJUICIO/DEMANDA JUDICIAL.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
remcos
RemoteHost
baloto1.duckdns.org:2019
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-NRZVSH
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
DAÑOS Y PERJUICIO/DEMANDA JUDICIAL.exe
-
Size
300.0MB
-
MD5
af43d6ddda738aa40b80b613f8d35921
-
SHA1
3eb0dac10c5432c5170086428ae2d698b2c16f6e
-
SHA256
4a47d92d581b4b746b48bb92057354415fea9343f744938e0d7454e9610b9222
-
SHA512
d10c04027e02766aa2c10f397f67eea33f28253b3a708e16d965ea3cc01f718ded33bfeeb00abdbeca22fac3b59efa5bc423d687e26520f5fab6c095d46b0a63
-
SSDEEP
12288:W8ryNswRXbW3UOk6r57kaclgzw7XXs8s3ssOdytTFbjLTxV:Z2NpXqDk6lg7aqX8v8Wbv
Score10/10-
Remcos family
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-