General

  • Target

    1c9ff0b44e4db1fc5a2f5a84c6add5af.bin

  • Size

    232KB

  • MD5

    be8ed525215b9d4f2d28a122b9bff706

  • SHA1

    8c76bbffce8ffe3c8f36c0aff567b2e965a443d1

  • SHA256

    28a22e809e65a0b3e1bb9b946ce36dea21a578079d5781ef62da3b7ed6673563

  • SHA512

    36b6310f3a467b1201f7ba40f36e6f09cfc2642f451331c037d8059a2d5d845081b04a1ba98ac7f4df4ff93c52529c07915babda28168e6fa82e7fb52b736d0b

  • SSDEEP

    6144:YRN6fUHRDtQk6eI6uqK/oItorJYwJ4F2Jy4h81qut35:tA9Z0/tyJYwJ4F29h8Xt35

Score
10/10

Malware Config

Extracted

Family

remcos

Version

4.6.0 Light

Botnet

RemoteHost

C2

192.168.175.1:1800

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-04OZR4

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1c9ff0b44e4db1fc5a2f5a84c6add5af.bin
    .zip

    Password: infected

  • c3f58fc7e4e51a2d4c6551fd6cebac7d8c0bf79d83f1235e7570c2db574df0f6.exe
    .exe windows x86

    Password: infected

    91377a95157c806dfb0314e0cc3b67cc


    Headers

    Imports

    Sections