General
-
Target
springlock.exe
-
Size
1.3MB
-
Sample
250403-jp24aavpx5
-
MD5
6cf41ecfa205a9b8e3eca92fe2a0017d
-
SHA1
d92c17c9045f0ec9557dd896e238737d51d12dab
-
SHA256
77f41b2f785bd720e1461e1a1ab968ffe620d683d448457c22f4620b890732e7
-
SHA512
5eebfdc122493d78ea7e3e11798c3ec2aa0eaf57e77d786e1c5740a1fb7ca7d1b4c849ecf105ec0a0b1bd7f539acf8c40f3ef2940c819c481ea32995985509f5
-
SSDEEP
24576:Ru6J33O0c+JY5UZ+XC0kGso6FaSNvEFhDgSHthSQ98DcjceDvWY:Du0c++OCvkGs9FaSN2Vg+tQXLY
Static task
static1
Behavioral task
behavioral1
Sample
springlock.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
remcos
RemoteHost
103.83.87.190:5817
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-E1OC2H
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
springlock.exe
-
Size
1.3MB
-
MD5
6cf41ecfa205a9b8e3eca92fe2a0017d
-
SHA1
d92c17c9045f0ec9557dd896e238737d51d12dab
-
SHA256
77f41b2f785bd720e1461e1a1ab968ffe620d683d448457c22f4620b890732e7
-
SHA512
5eebfdc122493d78ea7e3e11798c3ec2aa0eaf57e77d786e1c5740a1fb7ca7d1b4c849ecf105ec0a0b1bd7f539acf8c40f3ef2940c819c481ea32995985509f5
-
SSDEEP
24576:Ru6J33O0c+JY5UZ+XC0kGso6FaSNvEFhDgSHthSQ98DcjceDvWY:Du0c++OCvkGs9FaSN2Vg+tQXLY
Score10/10-
Remcos family
-
Drops startup file
-
Executes dropped EXE
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-