General
-
Target
RFQ 008191.exe
-
Size
777KB
-
Sample
241210-svrdeayndt
-
MD5
82ba32e4800897e8bafb32990d29f60a
-
SHA1
21b724df29b7ddbcd88849e7ad6ab12a4d266c4c
-
SHA256
777441225b9d294baca2f689286a1f70a0fc28007e86cf1cc099c71ee1d826f2
-
SHA512
7e741fab4e31223a967c4194f31e4fd592b75dc14dde4c72c3fbd5efb28f312807f886290fa8a227037890375d3ada7597857138f4df4d905b0ae4ca7b906101
-
SSDEEP
12288:UXqlVfD6qKMwy8kjKsge8jLAMsnI8c78pc+HeV4PRklT3we+doWVkeehown:UXqzrTK5XsgervnIac+Hm4QT31V1hown
Static task
static1
Behavioral task
behavioral1
Sample
RFQ 008191.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
RFQ 008191.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
remcos
RemoteHost
212.162.149.91:2404
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-HSAM04
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
RFQ 008191.exe
-
Size
777KB
-
MD5
82ba32e4800897e8bafb32990d29f60a
-
SHA1
21b724df29b7ddbcd88849e7ad6ab12a4d266c4c
-
SHA256
777441225b9d294baca2f689286a1f70a0fc28007e86cf1cc099c71ee1d826f2
-
SHA512
7e741fab4e31223a967c4194f31e4fd592b75dc14dde4c72c3fbd5efb28f312807f886290fa8a227037890375d3ada7597857138f4df4d905b0ae4ca7b906101
-
SSDEEP
12288:UXqlVfD6qKMwy8kjKsge8jLAMsnI8c78pc+HeV4PRklT3we+doWVkeehown:UXqzrTK5XsgervnIac+Hm4QT31V1hown
Score10/10-
Remcos family
-
Loads dropped DLL
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-