General

  • Target

    a4da37e92ca54c8851ad144fba875b61e2018f69bbe43b11926d8f8d831b56f0

  • Size

    475KB

  • MD5

    2b8f487213f3da1f42779e22d7b02d1a

  • SHA1

    77c96429d6facbd1900290c9cbfed378103b8e01

  • SHA256

    a4da37e92ca54c8851ad144fba875b61e2018f69bbe43b11926d8f8d831b56f0

  • SHA512

    2db88a30fdfc1e859edb7229b2073449b5d57640e484e21d78047fd674fc194c2c790995621b4d0ed7927ec06e8325c7333a1893227e50d38b2559fc267cc6bf

  • SSDEEP

    6144:GGqPd7rxgdfHD0Tnt5eh+4CwineHvWyBKxrw/5ttwAMS6NZ0sAOZZ7QX3cUiKRq:GGAxQj0bTe04CLneHvW9rwbxs/Z7WRq

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

Crypt

C2

185.225.73.67:1050

Attributes
  • audio_folder

    576ruythg6534trewf

  • audio_path

    %WinDir%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    76y5trfed675ytg.exe

  • copy_folder

    kjhgfdc

  • delete_file

    true

  • hide_file

    true

  • hide_keylog_file

    true

  • install_flag

    true

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    654ytrf654trf654ytgref.dat

  • keylog_flag

    false

  • keylog_folder

    67yrtg564tr6754yter

  • mouse_option

    false

  • mutex

    89765y4tergfw6587ryute-80UMP1

  • screenshot_crypt

    false

  • screenshot_flag

    true

  • screenshot_folder

    67y4htergf65trgewfd654tyrfg

  • screenshot_path

    %Temp%

  • screenshot_time

    10

  • startup_value

    6754ytr756ytr7654yretg8765uyt

  • take_screenshot_option

    true

  • take_screenshot_time

    5

  • take_screenshot_title

    bank

Signatures

Files

  • a4da37e92ca54c8851ad144fba875b61e2018f69bbe43b11926d8f8d831b56f0
    .exe windows x86

    b1c8f7572a6db205362528e88fd3ff32


    Headers

    Imports

    Sections