General

  • Target

    3016-75-0x0000000000400000-0x0000000000481000-memory.dmp

  • Size

    516KB

  • MD5

    f51e7c7f87beec9cfe158d2f1eefb485

  • SHA1

    cca59bbc3927f0a193a96e7dd80486d86dde184c

  • SHA256

    b014bfb66942fb8a28aec0ae03f5daab25a84f778899ea4d8bc9038ff0d40dd0

  • SHA512

    04f7f162c04c1dfb2943b941ceff7ef1ef7576f62932f4473b81233f545117e1374622cc87d0121555cd9cb33b0791c7bfcf807315b9c50820e79e3c528cc795

  • SSDEEP

    12288:HRXxReZj3WZfj/2eSseWFaIe2+f8CL47bs/ZO2:Hx7cyF2eSsewS8W47eZj

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

103.212.81.154:2404

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    true

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-4IP6LS

  • screenshot_crypt

    false

  • screenshot_flag

    true

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    2

  • take_screenshot_option

    true

  • take_screenshot_time

    2

  • take_screenshot_title

    email;payment;usd;paypal;bank;transfer;invoice;send;username;password

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3016-75-0x0000000000400000-0x0000000000481000-memory.dmp
    .exe windows x86


    Headers

    Sections