General

  • Target

    556-75-0x0000000000400000-0x0000000000480000-memory.dmp

  • Size

    512KB

  • MD5

    17169b2afa1ec0c0a5a55513d0bf3145

  • SHA1

    35161042e5a77c0e00319040f716dbdb33043567

  • SHA256

    96c7d63d3fdd4e1af70da422cbe5460fcf8ff8a92462785df2aea8ccd13f0c2f

  • SHA512

    8a94099a8fb1d110a54cb47c737f040cf0e398c36e503d7128e77d3a7bd8916e85329ce57acbdbc6435565fc88e3fdf520e640c1c645539e5dba54e262ffe17b

  • SSDEEP

    6144:njH9dY1fKmXbwxqbQWmudPOqwiXO3X2yjKCrp/5ttAAMS6NYUsAOZZgQXTc9:njdAK8wxqkXuxOqLXO3X2orpbKs/Zg

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

CONGO

C2

194.147.140.144:1993

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-BXO8P8

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 556-75-0x0000000000400000-0x0000000000480000-memory.dmp
    .exe windows x86


    Headers

    Sections