General

  • Target

    3232-144-0x0000000000400000-0x0000000000481000-memory.dmp

  • Size

    516KB

  • MD5

    719b2a4ed5fbf8e7a455eac6b65e62ac

  • SHA1

    18454ca32a97b65f3bf0f06a07456b6160106088

  • SHA256

    ee4d45cdf65f427af435450408c741d82903383fbebcd0ccb33278a725cc92ac

  • SHA512

    6f884d3114799f0cb63518a156c5d3d1373365b8f6cd16a4fd9a4d37b0ea394dd8b3a2a906aec1f401446b2a52fd490d500c3e72f6c188ed38ea5d7809fb51ae

  • SSDEEP

    12288:BRXxReZj3WZfj/2eSseWFaIe2+f8CL47bs/Zf2iDU:Bx7cyF2eSsewS8W47eZO

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

64.112.85.218:4888

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-95RP4I

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3232-144-0x0000000000400000-0x0000000000481000-memory.dmp
    .exe windows x86


    Headers

    Sections