General

  • Target

    3000-70-0x0000000072D50000-0x0000000073DB2000-memory.dmp

  • Size

    16.4MB

  • MD5

    96d991b31bf24512e60c3f81c805f766

  • SHA1

    37b0c3531ed9b21056dc2b5e179a026416507c4a

  • SHA256

    fb1a71083df3dd524caeb207d2af9703a081c578a0d4622f20038318fe0878e9

  • SHA512

    483102b0cbbb97523e3f5bfa723b2911be45985fb8a3a6195dd0a7389f3a28132f072ec17638d1553c28a5be2b4dbf7e64902dcf60455962aa1ee5fd4fbbfb9c

  • SSDEEP

    12288://+uL+HaIwUhWKbKdL41N4SShLhLibr0FJs/ZGXMDU:/mw+02bKdL4LRVb4FoZG

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

212.83.46.177:2404

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-GCYN23

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3000-70-0x0000000072D50000-0x0000000073DB2000-memory.dmp
    .exe windows x86


    Headers

    Sections