General

  • Target

    4872-175-0x0000000000400000-0x000000000047F000-memory.dmp

  • Size

    508KB

  • MD5

    ec5d789444529c69b3b52de0c5d609fe

  • SHA1

    d76f9be14a26768da9ae219081f231698c3e57f3

  • SHA256

    e60772a9c8de0bd3e7980accd146e42cf58b9a14397882dc66bb797ff00087c8

  • SHA512

    cc428fb0f998a87e106fa1eaa6c71c2146799074edf59a1409088b9d2b1109f70761f669cf8a32f74bd0fc38659df83484b9e98834e0dc7356a095ad9c3cac1b

  • SSDEEP

    6144:HLKPIsBiPVYkvO5OLRMIOeMqwCObQQkEf90gF8gHsAOZZZ1XzcFwCm4:HLKP3QYkvOI9fOeVwCOcQvZsfZZ14

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

12182022

C2

nikahuve.ac.ug:65214

kalskala.ac.ug:65214

tuekisaa.ac.ug:65214

parthaha.ac.ug:65214

Attributes
  • audio_folder

    MicRecords

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    true

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    true

  • keylog_file

    vbfxs.dat

  • keylog_flag

    false

  • keylog_folder

    fsscbas

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    dchfgsdmhj-TKZU09

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

  • take_screenshot_title

    notepad;solitaire;

Signatures

Files

  • 4872-175-0x0000000000400000-0x000000000047F000-memory.dmp
    .exe windows x86


    Headers

    Sections