General
-
Target
f9c6e2f4c1be741b973d13b711fe68c71a2245c9908d0345724805f5eff1e2e7.exe
-
Size
3.5MB
-
Sample
250118-fwed1stpby
-
MD5
6626a89aa5cc47a20e9de81360327a3e
-
SHA1
c50e1f4cd7dc8cc23a3b73e0fb49464bbb6f2511
-
SHA256
f9c6e2f4c1be741b973d13b711fe68c71a2245c9908d0345724805f5eff1e2e7
-
SHA512
c3f2d9b5e7ddc03e8d1318f3a0faecf9e60938650203acf17032c3685ddb084e5d209e1f89d09886cc72eff9103ab907949df409a28504817453c85f9d28d170
-
SSDEEP
49152:fT2Wd4IbtCaIZ+SgnCxaC+1R5oWjhRSTp8Z2WTWw/10tte7:SW5QxajvOWM8UWTWw/IU
Static task
static1
Behavioral task
behavioral1
Sample
f9c6e2f4c1be741b973d13b711fe68c71a2245c9908d0345724805f5eff1e2e7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f9c6e2f4c1be741b973d13b711fe68c71a2245c9908d0345724805f5eff1e2e7.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
remcos
fuck
republicadominica2025.ip-ddns.com:30202
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
rostad
-
mouse_option
false
-
mutex
iwebfiewbfihbewlfkm-WH4782
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
- startup_value
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
f9c6e2f4c1be741b973d13b711fe68c71a2245c9908d0345724805f5eff1e2e7.exe
-
Size
3.5MB
-
MD5
6626a89aa5cc47a20e9de81360327a3e
-
SHA1
c50e1f4cd7dc8cc23a3b73e0fb49464bbb6f2511
-
SHA256
f9c6e2f4c1be741b973d13b711fe68c71a2245c9908d0345724805f5eff1e2e7
-
SHA512
c3f2d9b5e7ddc03e8d1318f3a0faecf9e60938650203acf17032c3685ddb084e5d209e1f89d09886cc72eff9103ab907949df409a28504817453c85f9d28d170
-
SSDEEP
49152:fT2Wd4IbtCaIZ+SgnCxaC+1R5oWjhRSTp8Z2WTWw/10tte7:SW5QxajvOWM8UWTWw/IU
Score10/10-
Remcos family
-
Adds Run key to start application
-