General

  • Target

    580-71-0x0000000000400000-0x0000000001462000-memory.dmp

  • Size

    16.4MB

  • MD5

    dfd36b4f7bd320a436bd00d882a4ff74

  • SHA1

    2ef3b24ff41831ced6001c1a2800ab4f1b8a30b3

  • SHA256

    5d7955ddb011bda937317483d71d582e586510ec3548db716060906a1fb1fbe6

  • SHA512

    cea94dbdf3e0824caa3115fd96709d25e3751001c86ada53af40763d7410b164922b227b0a3797dd15d97224c3032de8cce0ec5788573e02f1dd12a367a43a1f

  • SSDEEP

    12288:GX8/Vx65HCnDAByqulR1fZJQds/Z8hRq:9/Vc5HCnDABMfZJQsZk

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

155.94.136.147:2409

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-Y9KU4Y

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 580-71-0x0000000000400000-0x0000000001462000-memory.dmp
    .exe windows x86


    Headers

    Sections