General

  • Target

    decode_f3932b52d30026ca8f7c14f62f77f596f809ac671466373b397038aa528e4d77

  • Size

    481KB

  • MD5

    576b4d3d9aad213f9e89c7354194bf78

  • SHA1

    b4483a96a83eaaff671e35c8ad9494541b1f1819

  • SHA256

    ac3a6ad13ede048573f561b04558c5b3e0e84a2a4af280b559794087018e369d

  • SHA512

    049354fa291d24ecdf4fcb3ab40cee3dc29646331c2672e5cfeb6083879c8c89bdbe5daaf7a0f34174c9ce1840595111f025654a5db01cd354254b77e4ec207f

  • SSDEEP

    12288:tRXxReZj3WZfj/2eSseWFaIe2+f8CL47bs/ZO2LDU:tx7cyF2eSsewS8W47eZj

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

New-28Jul

C2

procesjudicial2.duckdns.org:2254

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-74Y1GK

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • decode_f3932b52d30026ca8f7c14f62f77f596f809ac671466373b397038aa528e4d77
    .exe windows x86

    04d77d421b8e5297898a3fce39d74267


    Headers

    Imports

    Sections