General

  • Target

    1420-57-0x0000000000400000-0x0000000000474000-memory.dmp

  • Size

    464KB

  • MD5

    de415930f2e5b959f282cd0fe1b97c1b

  • SHA1

    e11f966c7cbcbc84e5bf4223bfc22c5d05f5be5a

  • SHA256

    8822387110c88aa8a2dc0188cece1a1cd76e15f5c9ac82546f2f6cf22bf76906

  • SHA512

    891f2b3e76903e85b70278199998a1a2bb78d9131ca832010a1c313bc237c15e270c259d683b03fa59f7bfed5fd246fbc16d7c3814f62c4ec04c4712fb4d4e81

  • SSDEEP

    6144:LrLmBOdXFrVRWdPBraNM6inbujnJwHXkVrVGb7FhHI2PuAO2SBX3W+cUHWS:LrLmBOrVmpCMLulOXkVrV2DEASFWiWS

Score
10/10

Malware Config

Extracted

Family

remcos

Version

4.6.0 Light

Botnet

RemoteHost

C2

192.168.175.1:1800

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-DMP3HT

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1420-57-0x0000000000400000-0x0000000000474000-memory.dmp
    .exe windows x86


    Headers

    Sections