General

  • Target

    3112-163-0x0000000000400000-0x0000000000480000-memory.dmp

  • Size

    512KB

  • MD5

    4497c11545929e8dc2c1a47a737f0629

  • SHA1

    79f2384a1c77466230693f688dd6029a6fb16f74

  • SHA256

    9c3b020d962097e7e27f42dd71c6502f4aba3aa7abeb30238c62fc7264d8732a

  • SHA512

    2fc99bf398ec1f04a0660a885b264386aa0ba2dc5914e0a53a59a6890b9b5aab8e4fb7566102e98c0190df1ded5798ea726688b95d2c94fc8256315a200ed63c

  • SSDEEP

    12288:pjdAK8wxqkXuxOqLXO3X2orpbKs/Zg/3BRq:3A3wxqkXuxOq+rpbRZeb

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

top.noforabusers1.xyz:2404

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    true

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-ABMG5G

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

Files

  • 3112-163-0x0000000000400000-0x0000000000480000-memory.dmp
    .exe windows x86


    Headers

    Sections