General

  • Target

    3740-163-0x0000000000640000-0x00000000006BF000-memory.dmp

  • Size

    508KB

  • MD5

    3eff46746af98d24e98364ae2da33f8d

  • SHA1

    2074d884124fa5771fba7a93dbb07cfce5c65669

  • SHA256

    7dec7b55650718f5527766db386f3d3e0cef2983b6c3d34187e1f7fe5673f1b5

  • SHA512

    99800e239abe646de89ee8b9d6e4c27d4cf4e6204ead7fda2838a576df6c16b38350abaf771b5d6d79cd0f46d6dcd2647bfa0316bb39a34cd7fd94f1c376ff2a

  • SSDEEP

    6144:y1mHSRSmP0kbktyNV67P00HZ5eOe9/KfYflKcIUgwsAOZZ7NXBcn+4:svFZbktE4r00DeOe9KANsfZ7l4

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

PACO 2023

C2

pacorem.duckdns.org:1377

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-05YAOS

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

Files

  • 3740-163-0x0000000000640000-0x00000000006BF000-memory.dmp
    .exe windows x86


    Headers

    Sections