General

  • Target

    268-65-0x0000000000400000-0x0000000000480000-memory.dmp

  • Size

    512KB

  • MD5

    23fcbf1c37681328d4c3088ac023b751

  • SHA1

    280649e5e6354c7f1828ff9cf7128d99147ef4da

  • SHA256

    87e7ddf26519537431c19ca8d105740661d06b193d22ff74cc7ceb640c93c731

  • SHA512

    8b0ec0f5ce371bdfc3ef04bf33b56248998a17957e55e062dc4061bcbcaf2a91dfac81118b668a58fc5513e24436b3c4f8e2dc72417e346739afbdb478b6570b

  • SSDEEP

    6144:IXVUvr+eNVx6JuGD5To83sRnymABKtqulRwOJfZJEfcZdC48hAiWsAOZZ8RX7mck:IX8/Vx65HCnDAByqulR1fZJQGs/Z8

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

208.67.107.123:8780

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-CL3TZF

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 268-65-0x0000000000400000-0x0000000000480000-memory.dmp
    .exe windows x86


    Headers

    Sections