General
-
Target
f933836fcaf2eeae4e50b67d06a9d1608e4bf7b2914864a10d0d23d201c7b747
-
Size
12.2MB
-
Sample
250205-ze75jstlcm
-
MD5
790af19df6a2c6827ff75f045d3cdfba
-
SHA1
06e6088988689e0673967cd4f6352ac76c4eff23
-
SHA256
f933836fcaf2eeae4e50b67d06a9d1608e4bf7b2914864a10d0d23d201c7b747
-
SHA512
e2b80895bfe98bdbca53b6de08a8e2ec4d574b635ea0fb101c2644538696d384b153d7be938419149f7f5d1604b65e12871fb32c1dc70b0c0d237408279dca0a
-
SSDEEP
196608:cMO3UEyReckSMYMv2/gkBX1L3lIUlOLuQMPGnuzSDBve5e86g:ct3UEytY2/gkBDgBMP1zSYb
Behavioral task
behavioral1
Sample
f933836fcaf2eeae4e50b67d06a9d1608e4bf7b2914864a10d0d23d201c7b747.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f933836fcaf2eeae4e50b67d06a9d1608e4bf7b2914864a10d0d23d201c7b747.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
remcos
roma
republicadominica2025.ip-ddns.com:30202
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
rose
-
mouse_option
false
-
mutex
iyvsidchvbsadbiubsaibjd-V6QG51
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
- startup_value
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
f933836fcaf2eeae4e50b67d06a9d1608e4bf7b2914864a10d0d23d201c7b747
-
Size
12.2MB
-
MD5
790af19df6a2c6827ff75f045d3cdfba
-
SHA1
06e6088988689e0673967cd4f6352ac76c4eff23
-
SHA256
f933836fcaf2eeae4e50b67d06a9d1608e4bf7b2914864a10d0d23d201c7b747
-
SHA512
e2b80895bfe98bdbca53b6de08a8e2ec4d574b635ea0fb101c2644538696d384b153d7be938419149f7f5d1604b65e12871fb32c1dc70b0c0d237408279dca0a
-
SSDEEP
196608:cMO3UEyReckSMYMv2/gkBX1L3lIUlOLuQMPGnuzSDBve5e86g:ct3UEytY2/gkBDgBMP1zSYb
Score10/10-
Remcos family
-
Downloads MZ/PE file
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-