General

  • Target

    1996-67-0x0000000000400000-0x0000000000480000-memory.dmp

  • Size

    512KB

  • MD5

    89fcfea7394c03336642f82c7106c21c

  • SHA1

    e32eacc88061be9fb2ea654d178a86b9adb3a3ef

  • SHA256

    44dee9b1a3f2272a8f05dcb3b122026bd93736e6743f76a6a0359b4332f52cd6

  • SHA512

    d33e128c8cb47d1f009c29663ab73b0cd95240255365ee54bd92ce217ff8b687ed804de172138280d7e1e5d7ef82264b2a66700f9e4d77eb26f8fa1ea1e5a0dd

  • SSDEEP

    6144:aGqPd7rxgdfHD0Tnt5eh+4CwineHvWyBKxrw/5ttwAMS6N20sAOZZ7QX3czzRq:aGAxQj0bTe04CLneHvW9rwb8s/Z71Rq

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

45.87.61.104:3033

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-QWPMSY

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

Files

  • 1996-67-0x0000000000400000-0x0000000000480000-memory.dmp
    .exe windows x86


    Headers

    Sections