General

  • Target

    5068-49-0x00000000283B0000-0x0000000028432000-memory.dmp

  • Size

    520KB

  • MD5

    bd5abf921ab929d913c51b17faea206d

  • SHA1

    d1f9dda13e6c27198af6d0398eed9f41c829d704

  • SHA256

    d092abc07a47e1a18f5b690aa16fa0a43b8435d11c097b0e70aaa5cb5b1c3b8e

  • SHA512

    2b60a3db38b628fec07083f5ca34be6632873409bb6e2fbf80d97145e827c66f1452f6dcef3e3ee5c8e9197cb39eb78927435faf2e005aae05fb5d38a87534c4

  • SSDEEP

    6144:3t9RHvEsBEeh8uVOzqdcwMMt0dEHP2d6d2L/zUAXPbB1sAOZZBUXscNAPbv:3/R8sBE5uY2OwhmdEHP527F1s/ZB1bv

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

www.akbeyaztckstil.com:2555

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    hgyres

  • mouse_option

    false

  • mutex

    Rmc-CUWO1K

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5068-49-0x00000000283B0000-0x0000000028432000-memory.dmp
    .exe windows x86


    Headers

    Sections