General

  • Target

    2952-2-0x0000000000400000-0x000000000055C000-memory.dmp

  • Size

    1.4MB

  • MD5

    16fa147a8e9a097dae81fd63897bfc85

  • SHA1

    5451a5f6f33e76dc66bae09e9bd73d21da1a04d3

  • SHA256

    232dad9ac8c3c8e6d21136401e8538bce66c0e06ab77bd3aac46be4abcc73e5d

  • SHA512

    d5e00d3978c3eb5fdbe39b94a4927e5bdf884b88b8b23bdaf63877b2f08e20cd293f8f6ecf9b81644bef37ced71b341ae4a4f4df5b3c1477d14b803ead52d5aa

  • SSDEEP

    24576:s+K496G7N3pcZEJ4ZM82OCVQKFc1JnZ3:VPNZcZydjVQKy1JnZ

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

22066

C2

37.1.222.255:22066

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    U7^G6&g-CRPBTC

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2952-2-0x0000000000400000-0x000000000055C000-memory.dmp
    .exe windows:5 windows x86


    Headers

    Sections