General

  • Target

    1672-66-0x0000000000400000-0x0000000000480000-memory.dmp

  • Size

    512KB

  • MD5

    66a9536d6d27a3ea296184a2432a01e8

  • SHA1

    cb010fbc4e06a5e20e54b75162f94c20879cf503

  • SHA256

    51d0b9a73b29a5b46765777dcef0d1fedf8150c6409ac444c8069b9eada3b01b

  • SHA512

    27dbec037d7321b925da68fd60536830e7c8c14e1a09560a75676a5a41a402a3a2b153523b173776a20f6d7ccfcd90e05f1e837cb5923ed206859f6cb174aa11

  • SSDEEP

    6144:6GqPd7rxgdfHD0Tnt5eh+4CwineHvWyBKxrw/5ttwAMS6N60sAOZZ7QX3cstRq:6GAxQj0bTe04CLneHvW9rwbgs/Z7cRq

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

report1.duckdns.org:5890

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-UAKGKQ

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

Files

  • 1672-66-0x0000000000400000-0x0000000000480000-memory.dmp
    .exe windows x86


    Headers

    Sections