General

  • Target

    844-82-0x0000000000400000-0x0000000000480000-memory.dmp

  • Size

    512KB

  • MD5

    9e96db2d19bbfd24a52590d3ba356237

  • SHA1

    a513d60a6f7c0600beb1615510c94de841414c79

  • SHA256

    cee4f829eaff115e033cd940a0952143f073e47aff27508b9250fb213fb5d1ff

  • SHA512

    2cc7017e8e4012da8039bf486bb4eb3b4bc1419cfd59ea25127038b01993ec2a8f05d34bd65daf2dd50cd793c2945c9f62aa01a7cfa2004d2cb1b31bf89056e8

  • SSDEEP

    6144:2GqPd7rxgdfHD0Tnt5eh+4CwineHvWyBKxrw/5ttwAMS6NZ0sAOZZ7QX3cU:2GAxQj0bTe04CLneHvW9rwbxs/Z7

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

185.216.71.245:6113

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-QKP4WJ

  • screenshot_crypt

    true

  • screenshot_flag

    true

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

Files

  • 844-82-0x0000000000400000-0x0000000000480000-memory.dmp
    .exe windows x86


    Headers

    Sections