General

  • Target

    decode_f0664fea4683b583f1dbbd46c9e941dfac1b3ada04fa01473099b2d8bc22ea5c

  • Size

    481KB

  • MD5

    31284e83413a3485270f5b738534bed2

  • SHA1

    d5cbd0ba632b69cf5f053a6b1971842225d81818

  • SHA256

    17f868d3cf88b2957c9544a2aeec29745f7ac744f914f7219eeb94b8f4062948

  • SHA512

    3adba8aa271f8b812750bcc0c52c5be31c0239aa5171142eafc7556ed705b488db73e62b0b9f55e7fb834883c0a6988e4bc7fd758b60081892f482d2606362a7

  • SSDEEP

    12288:PRXxReZj3WZfj/2eSseWFaIe2+f8CL47bs/Zf2KDU:Px7cyF2eSsewS8W47eZO

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

6Julio

C2

dosremdos.duckdns.org:7778

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    D

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-546K20

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • decode_f0664fea4683b583f1dbbd46c9e941dfac1b3ada04fa01473099b2d8bc22ea5c
    .exe windows x86

    04d77d421b8e5297898a3fce39d74267


    Headers

    Imports

    Sections