General

  • Target

    4404-141-0x0000000000400000-0x0000000000480000-memory.dmp

  • Size

    512KB

  • MD5

    4a2e593c9053ea788ecbf297a6b6c1e9

  • SHA1

    2616513df1617d3f092b8af6c515642a383dc99f

  • SHA256

    e5bea54a20bd8fcb2752a0b8ad3e10b3a2b223bc6471ca5f088cbb1c572e0a79

  • SHA512

    a974c9454d41568182463449d1a8bb69188c17d8db7e20d4880407e54448c00f1c205d7decc95a14ba91c8f2e3f4ff2276d86604111f83e646159f7b01f4f97b

  • SSDEEP

    6144:GGqPd7rxgdfHD0Tnt5eh+4CwineHvWyBKxrw/5ttwAMS6NZ0sAOZZ7QX3cUyRq:GGAxQj0bTe04CLneHvW9rwbxs/Z7XRq

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

Wazy-host 2023

C2

richardskoug34.ddns.net:7665

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    ros.exe

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    true

  • install_flag

    true

  • install_path

    %AppData%

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    Rmc-BCD8D2

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    os

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

Files

  • 4404-141-0x0000000000400000-0x0000000000480000-memory.dmp
    .exe windows x86


    Headers

    Sections