General

  • Target

    decode_c6ec09228523b78eeb028dd6c36403d58ccb38f87b1576ec5071c8f0b9415558

  • Size

    478KB

  • MD5

    61a01779d1734e6e1a12b31832d4a9b4

  • SHA1

    b1b514635f4f2290cd6ade46a71e31efe393776d

  • SHA256

    49342179b439a993b69af1a4b07c0adc03bfbdb1d96c65698e78249bf3022c77

  • SHA512

    bb79ac2c71e07653b1c3f68e8e9c6283e4f91e5ef651ff29a0657e063049089f6bf8492203eebe620e33218123edaf30dde3c7da6c61c64a0a608744fe28be1d

  • SSDEEP

    6144:S1EwL0xQk9VdeLuVnQs8QLgt8cBvnkCX/3Rde+A+DdsAOZZiXXPcNZ2OhX:S1EZT90uNQzYgScBvnn/XpTs/ZiJOhX

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

Negro Aseg

C2

dvdvalle123.duckdns.org:8787

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-6GBD85

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • decode_c6ec09228523b78eeb028dd6c36403d58ccb38f87b1576ec5071c8f0b9415558
    .exe windows x86

    3f3d4ba55ce3e8f736704310c56bf5aa


    Headers

    Imports

    Sections