General

  • Target

    856-82-0x0000000001F80000-0x0000000001FFF000-memory.dmp

  • Size

    508KB

  • MD5

    9cd9e4aada81d88da07760dc082a75a0

  • SHA1

    798d10b335d4d478cd81e7086624325bd1a5594c

  • SHA256

    3123f5f465bb6e1b7bbdd127c12c14714d4dbfbaee73c1397b12cb050e6d98ef

  • SHA512

    e336bcaab730d00a0b447de5701b2e9a4d01ed0e7f7ac01b5757efc938b16ba1699dc0108446f3f326270a036dc91b4a1213b5e34abc53ecc2dd74fd5052747c

  • SSDEEP

    6144:KYgW/v9pmXlDf8Mpy1IrIP7NDL7RkYZK/nU/0+Q5sAOZZpBXXcFR3Cm4:KnMj0lDE+EIr87NDnRrm5sfZpa4

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

TODAY-FILE

C2

dansanija.duckdns.org:2404

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    true

  • install_flag

    false

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    rmc

  • mouse_option

    false

  • mutex

    Rmc-XYGMBB

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

Files

  • 856-82-0x0000000001F80000-0x0000000001FFF000-memory.dmp
    .exe windows x86


    Headers

    Sections