General

  • Target

    1040-67-0x0000000000400000-0x000000000047A000-memory.dmp

  • Size

    488KB

  • MD5

    6886d16ac48f089a357bc6ab9be056c1

  • SHA1

    3280cd087edabad3a8e37da6afb0eb628451476d

  • SHA256

    d67f0fee3f7b0a1291038423c75f75cd83896759297e7e0901fac061fc1bf8fc

  • SHA512

    04829da974d2d5897935ae1e223fa74bc934bca65fff2259e608b0f4f543ec8910e56192fff176b0374904204a978e71e082f18e4dcc4f164c8f9b6458e9145f

  • SSDEEP

    6144:pOFBH/FMNjt18F+9a/NgAeDB4CcOtKp03b13a4LJ+sAOZZPWXbTcUa:pOFtiNBuFgawDB4NOmuwsfZP7

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

hendersonk1.hopto.org:2404

henderson1.camdvr.org:2404

centplus1.serveftp.com:2404

harrywlike.ddns.net:2404

genekol.nsupdate.info:2404

harrywlike1.ddns.net:2404

hendersonk2022.hopto.org:2404

genekol1.nsupdate.info:2404

generem.camdvr.org:2404

Attributes
  • audio_folder

    MicRecords

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    sonic.exe

  • copy_folder

    yakkk

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    true

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    chrome

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    gsgjdwg-1J0WWM

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    fuckuuuuu

  • take_screenshot_option

    false

  • take_screenshot_time

    5

  • take_screenshot_title

    notepad;solitaire;

Signatures

Files

  • 1040-67-0x0000000000400000-0x000000000047A000-memory.dmp
    .exe windows x86


    Headers

    Sections