General
-
Target
4116-71-0x0000000000EB0000-0x0000000002104000-memory.dmp
-
Size
18.3MB
-
Sample
241210-p8b9vs1lgl
-
MD5
e0bcf60b54afd95f9486935fb5713f11
-
SHA1
fef188f2ae0a5c8256fb984145ffa2af067e94b0
-
SHA256
d28c7c63bbd4670a1cbd8151c758be088a9fa96cfe8444243fde2e64c6444272
-
SHA512
1bbdd239f620b5438d199f7d693af89d75025a117b66d9bdf759949d15d98c031938f02b85c00d0ba48077bf5ef4c8bd23346defb90cc2e9a0c05885f30b8a57
-
SSDEEP
12288:VmV1V8EwcbrGpYOvmVfokBOKtMUnIsvZDdO+DY:EV1V8E3brUYms1MUnDZYs
Behavioral task
behavioral1
Sample
4116-71-0x0000000000EB0000-0x0000000002104000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4116-71-0x0000000000EB0000-0x0000000002104000-memory.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
remcos
RemoteHost
212.162.149.91:2404
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-HSAM04
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
4116-71-0x0000000000EB0000-0x0000000002104000-memory.dmp
-
Size
18.3MB
-
MD5
e0bcf60b54afd95f9486935fb5713f11
-
SHA1
fef188f2ae0a5c8256fb984145ffa2af067e94b0
-
SHA256
d28c7c63bbd4670a1cbd8151c758be088a9fa96cfe8444243fde2e64c6444272
-
SHA512
1bbdd239f620b5438d199f7d693af89d75025a117b66d9bdf759949d15d98c031938f02b85c00d0ba48077bf5ef4c8bd23346defb90cc2e9a0c05885f30b8a57
-
SSDEEP
12288:VmV1V8EwcbrGpYOvmVfokBOKtMUnIsvZDdO+DY:EV1V8E3brUYms1MUnDZYs
Score1/10 -