General

  • Target

    628-180-0x0000000000400000-0x000000000047F000-memory.dmp

  • Size

    508KB

  • MD5

    b7bb68a7da99d047a924b111948a6487

  • SHA1

    139939546e07309c30e28f282b8159c6922d36e3

  • SHA256

    e81e0052c0a3b566f72f444c2574f6653696844c42af8809d6ab1a8f5868fd02

  • SHA512

    021d6a80e0beb55fdb3e3695c68f38b28d91a9b35bd055140a6146b40c61391b5cdd65f63486e36eef88029da08678dd15323d06980986411210b26f9e1cd893

  • SSDEEP

    6144:HLKPIsBiPVYkvO5OLRMIOeMqwCObQQkEf90gF8mHsAOZZZ1XzcywCm4:HLKP3QYkvOI9fOeVwCOcQv3sfZZW4

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

12182022

C2

nikahuve.ac.ug:65214

kalskala.ac.ug:65214

tuekisaa.ac.ug:65214

parthaha.ac.ug:65214

Attributes
  • audio_folder

    MicRecords

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    true

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    true

  • keylog_file

    vbfxs.dat

  • keylog_flag

    false

  • keylog_folder

    fsscbas

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    dchfgsdmhj-TKZU09

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

  • take_screenshot_title

    notepad;solitaire;

Signatures

Files

  • 628-180-0x0000000000400000-0x000000000047F000-memory.dmp
    .exe windows x86


    Headers

    Sections