General

  • Target

    3124-138-0x0000000000400000-0x000000000047A000-memory.dmp

  • Size

    488KB

  • MD5

    a9c44ae53052ce07fbac6f878b6e4fd1

  • SHA1

    95fac8177094c106df80f0054c87675c7ec986e1

  • SHA256

    68d4fa80306b682268cb8a66e67e63b048ec84889398c07d1916030ecc0437d1

  • SHA512

    94f92b14368946021f8d620be65c2866f22ff22bf2c9f8f7d108ab3923f9d759280c0ed0891d1f6615522e46bc3794627063fe06cf59d574bc1df8c6d78b24db

  • SSDEEP

    6144:pOFBH/FMNjt18F+9a/NgAeDB4CcOtKp03b13a4LJ+sAOZZPWXbTcUa2yg:pOFtiNBuFgawDB4NOmuwsfZP72yg

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

hendersonk1.hopto.org:2404

henderson1.camdvr.org:2404

centplus1.serveftp.com:2404

harrywlike.ddns.net:2404

genekol.nsupdate.info:2404

harrywlike1.ddns.net:2404

hendersonk2022.hopto.org:2404

genekol1.nsupdate.info:2404

generem.camdvr.org:2404

Attributes
  • audio_folder

    MicRecords

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    sonic.exe

  • copy_folder

    yakkk

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    true

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    chrome

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    gsgjdwg-1J0WWM

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    fuckuuuuu

  • take_screenshot_option

    false

  • take_screenshot_time

    5

  • take_screenshot_title

    notepad;solitaire;

Signatures

Files

  • 3124-138-0x0000000000400000-0x000000000047A000-memory.dmp
    .exe windows x86


    Headers

    Sections