General

  • Target

    NEAS.e651d7bfb7e6f881af0f6f61945924aaexe_JC.exe

  • Size

    176KB

  • MD5

    e651d7bfb7e6f881af0f6f61945924aa

  • SHA1

    7a12033a93ddf1d4952ce9554f9bfefc40022b0e

  • SHA256

    f19645db238198118dee63b55fbfe912f7e680be1dcdc9c40c9773e87d6d5ddc

  • SHA512

    9f64f81595f1cacec36dd6bb889f661aa3728bcf3c5c58cdafb074d9e5ff7cecb09923669e89036ae87348123f1a8cd111c12251019f3388b3c0bf33a798b954

  • SSDEEP

    3072:2hzYTGWVvJ8f2v1TbPB4THNThy+JP/P6Aru92lQBV+UdE+rECWp7hK9:2hzOv2fM13B4THNT7P/P6UuhBV+Udvrn

Score
10/10

Malware Config

Extracted

Family

remcos

Version

1.7 Pro

Botnet

hacked

C2

193.161.193.99:60921

Attributes
  • audio_folder

    audio

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    5

  • copy_file

    chrome.exe

  • copy_folder

    remcos

  • delete_file

    true

  • hide_file

    true

  • hide_keylog_file

    true

  • install_flag

    true

  • install_path

    %WinDir%\System32

  • keylog_crypt

    true

  • keylog_file

    chrome.dat

  • keylog_flag

    false

  • keylog_folder

    chrome

  • keylog_path

    %WinDir%\System32

  • mouse_option

    false

  • mutex

    chrome

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screens

  • screenshot_path

    %AppData%

  • screenshot_time

    1

  • startup_value

    chrome

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • NEAS.e651d7bfb7e6f881af0f6f61945924aaexe_JC.exe
    .exe windows:4 windows x86

    d3a62971944197f0701c7049a9c739d1


    Headers

    Imports

    Sections