General

  • Target

    1080-163-0x0000000000400000-0x000000000047A000-memory.dmp

  • Size

    488KB

  • MD5

    fa3bee13cfd053936ca2f2ac6fd66258

  • SHA1

    314f5fa72c867e7b38a954d053877276ae32546a

  • SHA256

    d65ff889abdf49167592e388f879fc1a617c0014fdedff1f51ea3d444b22ff11

  • SHA512

    deb18d56cc94bbea87833d0a33cc00888fd2d93ebf6a6048303f83bde4fe7484a4b7e1f2a88916ac05a4dbdf43d6f3628d29dff5fd5f158cb7bc4ed08bf42a70

  • SSDEEP

    12288:ooCqKde3G314caiojGRoaOd+2sfZs0Vg:tAdIG314cFo4Od+NZZS

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

YK_Air_NP

C2

odi111.ddns.net:3546

Attributes
  • audio_folder

    MicRecords

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    Remcos-Q66GXU

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

  • take_screenshot_title

    notepad;solitaire;

Signatures

Files

  • 1080-163-0x0000000000400000-0x000000000047A000-memory.dmp
    .exe windows x86


    Headers

    Sections