General

  • Target

    844-66-0x0000000000400000-0x0000000000480000-memory.dmp

  • Size

    512KB

  • MD5

    137ae656e64b90aa9b081977847d7f9b

  • SHA1

    d08c9c578d6741b25d99daa9836008086ef93075

  • SHA256

    cb03ec9a711f6dfd8a2d715759de4363d672cfb33fadf07585fc0118cba47d35

  • SHA512

    e1020f39173a92e41a95410b0ff8c625d281f2e120c14bd7f2a5083d491130420611f60e983712dd2b6a30863f77c252276f533c05221eca9c4ee96b2e150bbf

  • SSDEEP

    12288:9jdAK8wxqkXuxOqLXO3X2orpb9s/Z6ih2BRq:jA3wxqkXuxOq+rpbMZg

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost mr cat

C2

149.202.24.70:1960

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-WRUQCQ

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

Files

  • 844-66-0x0000000000400000-0x0000000000480000-memory.dmp
    .exe windows x86


    Headers

    Sections