General

  • Target

    2528-163-0x00000000023A0000-0x0000000002420000-memory.dmp

  • Size

    512KB

  • MD5

    d80b1774b526b51db02bb6cd19cca600

  • SHA1

    b0df338abd22f81b3d4b0e5ef0d33b87b5ab7bb1

  • SHA256

    8f500ed2a045c1193124746711a744698acad1dea7eaafc743ffae3e09814e8c

  • SHA512

    2c0c7cc2029104dec846c95eceabcf69b926e8cd59b23cf1cfba00f4d99649eb0aebfdb2b90e32d596576f281b0677b11af77c3686469ba724a093f9207cbc06

  • SSDEEP

    12288:tTNVSK+kZqcHkCeTj6P32IHj98Gs/ZGzBRq:DcrkZqcHkCeKj98NZm

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

PELE MONEY

C2

pelerem.duckdns.org:1550

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-R4O5IZ

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

Files

  • 2528-163-0x00000000023A0000-0x0000000002420000-memory.dmp
    .exe windows x86


    Headers

    Sections