General

  • Target

    1608-66-0x0000000000150000-0x00000000001CF000-memory.dmp

  • Size

    508KB

  • MD5

    1eea340cb516e56477a250a29894327e

  • SHA1

    c84f9f4f1a2dd3eb4f5e1a51c1767569a7a1143d

  • SHA256

    c02ca791dfb1eb5162f657cc6644353cc05589085bf7c3c254d03fe914d7206d

  • SHA512

    694cb79f1d6f82e36b5e85f97cf14956a9104f658066539992f00061d52772aa28fc37a588a7d2a9dc934aa11f0af0b9908fa69387d1ea8c841260b4cfbd12a0

  • SSDEEP

    6144:nt5sORmjlApc4Sl5vidotdjDAUgZVjso6k8BSGMV02LobDsAOZZgIXoc+g:ntmox/Sl5vkKtAXjsoZ8wHonsfZg

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

worldclass

C2

91.193.75.188:60005

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    worldclass.exe

  • copy_folder

    worldclass

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    true

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-BY6BKA

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    worldclass

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

Files

  • 1608-66-0x0000000000150000-0x00000000001CF000-memory.dmp
    .exe windows x86


    Headers

    Sections