General

  • Target

    3736-139-0x0000000000400000-0x000000000047F000-memory.dmp

  • Size

    508KB

  • MD5

    e872538a7724ec84e86d7caad9f2829d

  • SHA1

    ce26b1f1dc94ac3078ffbd283894babe87310309

  • SHA256

    6e8b25f1d2604e822a347861d601968155fa52cf5092de5a1633e07366cc7018

  • SHA512

    fc103d773855ff4ae92ee7664ad268a672b043f10a4369478603611bf7d4a7be450cd1ebe62bcff23bfd7148fcd9a294989ab5ea9d548a0a70d4a1905aec1287

  • SSDEEP

    12288:Omnk7iLJbpIpiRL6I2WhSKQ9ZsfZQSqn9:2iLJbpI7I2WhQqZ7q9

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost Ewa Cartoon

C2

164.68.105.38:1960

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-C9NN2D

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

Files

  • 3736-139-0x0000000000400000-0x000000000047F000-memory.dmp
    .exe windows x86


    Headers

    Sections