General

  • Target

    112-170-0x0000000000630000-0x00000000006B0000-memory.dmp

  • Size

    512KB

  • MD5

    ce3c4a8ceac2bb08246e98a41f4410f6

  • SHA1

    8acbc3c3c14b326fb49ba118ec14a6c70e2575e5

  • SHA256

    2619f8aea95e98b8ab4b36b3c3f9ec6f5f43062bdc099a75f73b9b85c82af5d9

  • SHA512

    802752fb7fbdb31bf6cc3ccb437c21417a46c7bb3dc8bf8e3e81adcb07f6f0bfd62e88118042a1e40ca8bc35515e6525b084a99d793cc32ec3bdc7163a8d961d

  • SSDEEP

    12288:AGrRskHHCXpwNqq8qncZGL6rUCPtylFs/ZexMBRq:FRskHikqq8qncZGYylUZP

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

UP

C2

79.110.63.178:8974

plunder.nsupdate.info:8974

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    true

  • install_flag

    false

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    vsr

  • mouse_option

    false

  • mutex

    Roup-JE7MFN

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

Files

  • 112-170-0x0000000000630000-0x00000000006B0000-memory.dmp
    .exe windows x86


    Headers

    Sections