General

  • Target

    1856-70-0x0000000000400000-0x0000000000421000-memory.dmp

  • Size

    132KB

  • MD5

    986ed584d21311a6a14b85369c1f0575

  • SHA1

    d48a0b26cb953ad9b11eb67eed3d2fb845a8caf4

  • SHA256

    c0a07dba8ed1cc3715015d3ab5ce88ccac880df404f5547a2f861ca4e141d08e

  • SHA512

    296abb81e34c904fec514a5cf6ece7032e2f1ac86952385cbc066d2e82ff55f1f7f937818f3777bd4b09024b0bd40927dbef835986d04dd1d2f1136b535533e3

  • SSDEEP

    3072:i4XgM0gTUJNFbnOabI/JZ7k0qvo7wvdbnrlSl26FabmrzqhEe:9XgMtwNFbOabI/qxlSl26FaKrzqhE

Score
10/10

Malware Config

Extracted

Family

remcos

Version

2.7.1 Pro

Botnet

ONYEKA

C2

46.183.217.11:64702

127.0.0.1:64702

10.29.111.143:64702

Attributes
  • audio_folder

    MicRecords

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    Remcos-JBIX5I

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

  • take_screenshot_title

    wikipedia;solitaire;

Signatures

Files

  • 1856-70-0x0000000000400000-0x0000000000421000-memory.dmp
    .exe windows x86

    fa1107e773796a494c44045d5372098c


    Headers

    Imports

    Sections