Behavioral task
behavioral1
Sample
2328-43-0x00000000004A0000-0x00000000016F4000-memory.exe
Resource
win10v2004-20250314-en
General
-
Target
2328-43-0x00000000004A0000-0x00000000016F4000-memory.dmp
-
Size
18.3MB
-
MD5
94743d094f62dfb47c6ef9d93464be41
-
SHA1
94113167f5312e57964101d2da4a142829d19f27
-
SHA256
102b7e7b62b50a9970bb6eb70f12f545cfb305f31500d92cc4ee0d3144ab5a2a
-
SHA512
365669414d5fc56b7b50d6cdbb5caa0423294d6431a01f88e91338289046c4ddd5c620bb605335e711a9ff0b07d11f65e14cd374bcb969b3781d01f56359e393
-
SSDEEP
12288:HcLGGMDRQEr8GMiuvjjAbogI7kZgJJsvZGY:EG6Er8xiGX7kZgJgZ
Malware Config
Extracted
remcos
RemoteHost
193.222.96.222:2404
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-QZQ9S9
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2328-43-0x00000000004A0000-0x00000000016F4000-memory.dmp
Files
-
2328-43-0x00000000004A0000-0x00000000016F4000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 348KB - Virtual size: 348KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 99KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ