General

  • Target

    816-891-0x00000000003B0000-0x0000000000881000-memory.dmp

  • Size

    4.8MB

  • MD5

    d8d500f173a83192fddeefc501e0996a

  • SHA1

    a8bbb1d2fe121c9f42f7db94c371f8605c3ad5a4

  • SHA256

    861045138a12a9f231ec1c4a8b233b3b34ae2d239721a1c54b2137b4b29491ce

  • SHA512

    980cd75ad38089a724c58918f023e1df7f7c188624161bac6c188e01b4671d234680213578b0e5434584ba7b8e481f326cd81a8a9b62500cb049454336fd0e64

  • SSDEEP

    6144:92cubSEcJttzRoXmuGu3ZVhBueMzWrCk+bxPu/3OxsAOZZdtX9c7jtS6d:92cubCttVkmzuhBuefrFdasfZdatS6d

Malware Config

Extracted

Family

remcos

Botnet

AGOSTO 15 TinyManipulator whatsapp

C2

servicios.disenospublici.info:5507

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    umniuyans

  • mouse_option

    false

  • mutex

    ioujnansd-83WZB0

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 816-891-0x00000000003B0000-0x0000000000881000-memory.dmp
    .exe windows x86


    Headers

    Sections