General

  • Target

    4280-288-0x0000000000400000-0x000000000047E000-memory.dmp

  • Size

    504KB

  • MD5

    1af7050bd975c0b0dfbf7e226aa0e420

  • SHA1

    75cdda9213b35f98aabea0f82139c70bcae0387e

  • SHA256

    281e95a399e250211cef59a771265f03a2adb5f190245512bb8464d20c4bf30f

  • SHA512

    625e6768d433b8b6c205699e2bf3ce24379d8894d613823c4d45dd1f54c7a049c6feb7aa5d233892c746a578fe33438dfc4123b5ca6adbdd7955430b0f8e670c

  • SSDEEP

    12288:ofCa8/Vs8aGksOT3hysn1FrdgsfZyOdN:u7GVs8aGpO1FrdrZ7L

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

yak

C2

bestsuccess.ddns.net:2442

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    dfe.dst

  • keylog_flag

    false

  • keylog_folder

    rtrrrrrrrrrrrrrrrr

  • keylog_path

    %Temp%

  • mouse_option

    false

  • mutex

    ssssssssssssssssssssssa-VBDY16

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

Files

  • 4280-288-0x0000000000400000-0x000000000047E000-memory.dmp
    .exe windows x86


    Headers

    Sections