General

  • Target

    f7f8d1ebfed3afd13eb47392a7f502603ecb970a817c221682cd8f2a17ff2bb3

  • Size

    471KB

  • MD5

    ac382bfcfaea86b5749f7abc571ccf12

  • SHA1

    928454bcce909ea349a03b14c043430905a88fdb

  • SHA256

    f7f8d1ebfed3afd13eb47392a7f502603ecb970a817c221682cd8f2a17ff2bb3

  • SHA512

    07cacc471ac863ac12db6f0d4c7a75d968dea257f7f5f722a830e9b5239f45071e1a3fe19c17faca06aec4a48f8456d3590f8643c618a023838aca46e0c03c4d

  • SSDEEP

    6144:EbdjQFiTrgVohW1ydxCrLkE7ZFCSq1zeH4L5WIMOHsAOZZL1XBcYs4:EbdUYCohW1kMfkEbCSqxeYdsfZLU4

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

12-22-22

C2

194.180.48.225:1024

Attributes
  • audio_folder

    iujhgv

  • audio_path

    %Temp%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    lkjhg.exe

  • copy_folder

    sdfghjk

  • delete_file

    true

  • hide_file

    true

  • hide_keylog_file

    true

  • install_flag

    true

  • keylog_crypt

    false

  • keylog_file

    oijkhb.dat

  • keylog_flag

    false

  • keylog_folder

    hgfds

  • keylog_path

    %WinDir%

  • mouse_option

    false

  • mutex

    yuhgfd-9Z85LD

  • screenshot_crypt

    false

  • screenshot_flag

    true

  • screenshot_folder

    lkjhg

  • screenshot_path

    %AppData%

  • screenshot_time

    5

  • startup_value

    ijhgf

  • take_screenshot_option

    true

  • take_screenshot_time

    5

  • take_screenshot_title

    bank

Signatures

Files

  • f7f8d1ebfed3afd13eb47392a7f502603ecb970a817c221682cd8f2a17ff2bb3
    .exe windows x86

    c9b0c44044380df67a7de0c7865c0e2a


    Headers

    Imports

    Sections