General

  • Target

    4400-163-0x0000000000400000-0x0000000000480000-memory.dmp

  • Size

    512KB

  • MD5

    098c8acafcddb466143a540e68d801ee

  • SHA1

    5fda7820e925d750f38f1c2d327bef38b9e75890

  • SHA256

    812f10927c53c78ef2ac12c050dbdbe4a753bd202380e94f323c6307b04e8249

  • SHA512

    2c85acc4932445f4647cce46d8e495c9089841f7271a263923a09b424e4f83576005c2700e8ef1cbc2fca84d44cabbf0d2986c9103be735df061dd1d3b967d81

  • SSDEEP

    12288:JjdAK8wxqkXuxOqLXO3X2orpbKs/ZgyBRq:XA3wxqkXuxOq+rpbRZR

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

TEST1Host

C2

yasinkayites.ddns.net:2049

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-G9LRHM

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

Files

  • 4400-163-0x0000000000400000-0x0000000000480000-memory.dmp
    .exe windows x86


    Headers

    Sections