General

  • Target

    1712-191-0x00000000009A0000-0x0000000000A1F000-memory.dmp

  • Size

    508KB

  • MD5

    d19292f6ff67b35ba983d57dce47635e

  • SHA1

    f97cb3b27eaf9f5404d815531ad3c0e6978cb4c8

  • SHA256

    8f686df74f31c26d6440da8c70566b3c50fd7a47bd90cf8b8c258fd6caee27ee

  • SHA512

    5061a73d6c5b79b4ef7316988da436e9700b03e7e8e43ac40bc17fa4d94d25b426a940edadab4dc6229a734dfcede50685c8495c5aafbae478023d26632a8a91

  • SSDEEP

    6144:uv0D6zAF8fi6nHVpkAQ7cjtMLW8VVJ1A7czOkbivICsAOZZo2XXcRg5N:20ekF+Nn1WA8cjStVVJS7cKVsfZoK5N

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

FESTIVA-EMEKA

C2

www.festivapherma.com:2404

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    RMC

  • mouse_option

    false

  • mutex

    Rmc-RL4E0I

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

Files

  • 1712-191-0x00000000009A0000-0x0000000000A1F000-memory.dmp
    .exe windows x86


    Headers

    Sections