General
-
Target
325949d328ac684b0d748a649434e470d41ed2ba020aee069c377523cda63d7c
-
Size
1.2MB
-
Sample
241213-ft3nts1laj
-
MD5
15438fc89eb16b5dbb027e070c0893d2
-
SHA1
500b301d5b7c498e70e83969f584a99cf74916c2
-
SHA256
325949d328ac684b0d748a649434e470d41ed2ba020aee069c377523cda63d7c
-
SHA512
680273a284114055cf566b6844d5bca040f43ae1cd3e891a7f647fe6ed71218d5ae1a4ff6e4c9529f111f38cd3d9a7522e991165986a7f93a563e1e9a24cae23
-
SSDEEP
24576:uv62PZ8soli/9ygzz1CAwTJl461O113BdBmC2BWU0xK9PKmIi1CbxiI8:u9isolu25To6141LBgIw1W0I8
Static task
static1
Behavioral task
behavioral1
Sample
AW Neue #PO 4500515595 ULTRA.exe
Resource
win7-20240708-en
Malware Config
Extracted
remcos
bin
cjmancool.dynamic-dns.net:3764
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-K9CJCH
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
AW Neue #PO 4500515595 ULTRA.exe
-
Size
1.3MB
-
MD5
fc0b616c9cb543fe6aa4db594ff80011
-
SHA1
aed4962dcd4653914d6edc21384461f0ecbe452f
-
SHA256
856ed906a0252eda990d48de86b734e45e3de1a30466a698e5e8f05e7f36518c
-
SHA512
3a5593e44133e5e178b51abc46ff6d4e50b6b420d3ac861a94c336a57e3ba676c3544ff10475b098ceb893e3baec752a768ab85c9a3d86b65d48606cadb708c4
-
SSDEEP
24576:eE3rxwfUa2PZYsoJmj9KgzxVCAITllk61O1133ZBEIIBWUixI9xKGAi1qbxb5PP:eE3qGSsoJIYBTY6141ZB8m2p+/PP
-
Remcos family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Drops startup file
-
Suspicious use of SetThreadContext
-