General

  • Target

    1756-67-0x0000000003C60000-0x0000000003CDE000-memory.dmp

  • Size

    504KB

  • Sample

    220810-sblzksbfcl

  • MD5

    09d27164a18ad83461970c0e65d7ad8d

  • SHA1

    191b51ae2f38680093d2b25ceedd607b78e0e10c

  • SHA256

    0395e8619f462b688f8240aac7e364b350c0521854f1911f09d7a0a3532a5752

  • SHA512

    85ded4c91e306df6a53fefe0026e648e7e8477eda8fa3ef45298f4d06bf633ea4f9db4d0e60e6610cd38137bd8c061633302b45cb2f8cff83b3b75fee984711a

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

onige123

C2

goodygoody.duckdns.org:1905

154.53.43.207:1905

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    gamingsofts.exe

  • delete_file

    false

  • hide_file

    true

  • hide_keylog_file

    true

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    aesjes.dat

  • keylog_flag

    false

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    sijresuestusawar-YZOEW4

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    gamingsoft

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      1756-67-0x0000000003C60000-0x0000000003CDE000-memory.dmp

    • Size

      504KB

    • MD5

      09d27164a18ad83461970c0e65d7ad8d

    • SHA1

      191b51ae2f38680093d2b25ceedd607b78e0e10c

    • SHA256

      0395e8619f462b688f8240aac7e364b350c0521854f1911f09d7a0a3532a5752

    • SHA512

      85ded4c91e306df6a53fefe0026e648e7e8477eda8fa3ef45298f4d06bf633ea4f9db4d0e60e6610cd38137bd8c061633302b45cb2f8cff83b3b75fee984711a

    Score
    1/10

MITRE ATT&CK Matrix

Tasks