General

  • Target

    656-139-0x0000000000400000-0x000000000047F000-memory.dmp

  • Size

    508KB

  • MD5

    ce6b7a0a1fab45884dbdd67f27abd547

  • SHA1

    11c95e5841064f92ac3fa21bea039d542252c67f

  • SHA256

    b5ccab627961b0f25155208dcddafacdb35710a08d1e0b8bd2c1daa3cd298ba3

  • SHA512

    e32e07468d178c30866a87798f4e5b34c3cc35955001a555459c56d32a0e95364df5050f5c1240269835e4d196b15d628e63a241f042a99ca97901fdaa512121

  • SSDEEP

    12288:Wmnk7iLJbpIpiRL6I2WhSKQ9ZsfZQSKn9:uiLJbpI7I2WhQqZ7K9

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

Awele

C2

gdyhjjdhbvxgsfe.gotdns.ch:2718

Attributes
  • audio_folder

    MicRecords

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    qoc.exe

  • delete_file

    false

  • hide_file

    true

  • hide_keylog_file

    true

  • install_flag

    true

  • install_path

    %AppData%

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    Remcos-LLTFOH

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    mix

  • take_screenshot_option

    false

  • take_screenshot_time

    5

  • take_screenshot_title

    notepad;solitaire;

Signatures

Files

  • 656-139-0x0000000000400000-0x000000000047F000-memory.dmp
    .exe windows x86


    Headers

    Sections