General

  • Target

    536-99-0x0000000000400000-0x0000000000615000-memory.dmp

  • Size

    2.1MB

  • MD5

    2f83821f816f704f225580b3ad3d87c3

  • SHA1

    75e7e6676a71819ffef639be2af4ecc572eb03b4

  • SHA256

    d4052d3b6ed805cbf2e574ed2d0327be7ba15f5147c9ae68261a62a148084f92

  • SHA512

    5b484ea3962dc9483ed572d1e5df4b80aa3a9a333a641080293171e188aefc5be87fc368d21f47400922751bcc911d1e868e719b797824244295909dd9e3b620

  • SSDEEP

    12288:U406AQY5PupeoDrQ+3JJmYZHQjs/ZPqtRq:w6A15PupeoDrQeZHQmZG

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

155.94.185.15:2404

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-FUG8H1

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

Files

  • 536-99-0x0000000000400000-0x0000000000615000-memory.dmp
    .exe windows x86


    Headers

    Sections