General

  • Target

    3524-162-0x0000000000400000-0x0000000000480000-memory.dmp

  • Size

    512KB

  • MD5

    28d1431ec88fbdba81e14dea1e8f1e48

  • SHA1

    d370f18f1ed1e196735377de71a52cde87ac56f1

  • SHA256

    c78261fdbe3041be95027b55e5aec0c332ae68e8300dfc914f77c5c00a0087bf

  • SHA512

    523a2018d80130a926a58329b4417f345418bae2a57c7890c9811dd38d6b64f20c135e37e29f8afc483e6dfc70a0fb89021d4a73be15a9e64e5a9326fa74b9de

  • SSDEEP

    12288:o406AQY5PupeoDrQ+3JJmYZHQJs/ZPgtRq:86A15PupeoDrQeZHQoZk

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

RemoteHostt

C2

top.noforabusers1.xyz:2404

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-2WXPWK

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

Files

  • 3524-162-0x0000000000400000-0x0000000000480000-memory.dmp
    .exe windows x86


    Headers

    Sections