General
-
Target
17364916858196b8cf3ca6bc3e069a3e8e9b4a974f8245ed13fdd20678ee3616c5a95c5000575.dat-decoded.exe
-
Size
481KB
-
Sample
250110-hlb71syjgm
-
MD5
4a17a8d2df7c866fbd37655a20223bce
-
SHA1
c8f9a96c5d190ff85387e21ad1a718f7893ae622
-
SHA256
d5ab553077edb632186fae2823dc664396267b4d40ac6fae4d27569be21bf03c
-
SHA512
07c2b3110806b9220cac20bff8b7406ee62dc19b0beea4c597562a22f87d9b1e0798106f2ef87f8aa1222b512a0bbec63cdd6e21edf8144f2f5f5c446424629e
-
SSDEEP
12288:ruD09AUkNIGBYYv4eK13x13nZHSRVMf139F5wIB7+IwtHwBtVxbesvZDS1+DY:u09AfNIEYsunZvZ19ZGs
Behavioral task
behavioral1
Sample
17364916858196b8cf3ca6bc3e069a3e8e9b4a974f8245ed13fdd20678ee3616c5a95c5000575.dat-decoded.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
17364916858196b8cf3ca6bc3e069a3e8e9b4a974f8245ed13fdd20678ee3616c5a95c5000575.dat-decoded.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
remcos
RemoteHost
rras.duckdns.org:57870
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
Google.exe
-
copy_folder
Google
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%WinDir%\System32
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc$urG9345JRjuDjdGoHs-X9QG73
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
17364916858196b8cf3ca6bc3e069a3e8e9b4a974f8245ed13fdd20678ee3616c5a95c5000575.dat-decoded.exe
-
Size
481KB
-
MD5
4a17a8d2df7c866fbd37655a20223bce
-
SHA1
c8f9a96c5d190ff85387e21ad1a718f7893ae622
-
SHA256
d5ab553077edb632186fae2823dc664396267b4d40ac6fae4d27569be21bf03c
-
SHA512
07c2b3110806b9220cac20bff8b7406ee62dc19b0beea4c597562a22f87d9b1e0798106f2ef87f8aa1222b512a0bbec63cdd6e21edf8144f2f5f5c446424629e
-
SSDEEP
12288:ruD09AUkNIGBYYv4eK13x13nZHSRVMf139F5wIB7+IwtHwBtVxbesvZDS1+DY:u09AfNIEYsunZvZ19ZGs
Score3/10 -