General

  • Target

    1188-149-0x0000000000400000-0x000000000047F000-memory.dmp

  • Size

    508KB

  • MD5

    4376f32ff071af1b5578b29ebe33acc2

  • SHA1

    c141ad58fe904ab2f2ccb9107a2a83c9c215e6b6

  • SHA256

    b9230077e8b5e2ce2dd99342ad57150dfbe6248675e6976aaa8d85ed20274e39

  • SHA512

    48e46b66b4b006dc872ec5fe2daa0617cae1205da3bdf140aaa4903c64bd49ac68e9831294ac40f3339738ba6e692945309fde5d540114c5c08b1365e66cd85c

  • SSDEEP

    12288:Wmnk7iLJbpIpiRL6I2WzKQ9ZsfZQSrn9:uiLJbpI7I2WhqZ7r9

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

winamd.org:443

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    234qw.exe

  • delete_file

    true

  • hide_file

    true

  • hide_keylog_file

    false

  • install_flag

    true

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    thg-K7JBH8

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    winfh

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

Files

  • 1188-149-0x0000000000400000-0x000000000047F000-memory.dmp
    .exe windows x86


    Headers

    Sections