General

  • Target

    276-66-0x0000000000400000-0x000000000047F000-memory.dmp

  • Size

    508KB

  • MD5

    177a3d41ecd31e0b831bf4057b78b45c

  • SHA1

    680874f09dc81315e17a5b31c23b18b044929a05

  • SHA256

    0bde571a0fe635e0ec4339d2060e71186e43ebf02e283fa21f9728e4d70866c8

  • SHA512

    7f9b9d54e933ac244d8ab0c707b35bf663e4e65362768a11b086bf82569e621ed9619d7a7c65222a95a8da666f04e42884596d56c701780f69bd7528c233392b

  • SSDEEP

    6144:3LKPIsBiPVYkvO5OLRMIOeMqwCObQQkEf90gF8gHsAOZZZ1Xzcc:3LKP3QYkvOI9fOeVwCOcQvZsfZZ

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

worldclass

C2

91.193.75.188:60005

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    worldclass.exe

  • copy_folder

    worldclass

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    true

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-UPD1GY

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    worldclass

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

Files

  • 276-66-0x0000000000400000-0x000000000047F000-memory.dmp
    .exe windows x86


    Headers

    Sections