General

  • Target

    2852-359-0x00000000002F0000-0x0000000000819000-memory.dmp

  • Size

    5.2MB

  • MD5

    2c6f8170e5404c6a3a2cea28c8dd2754

  • SHA1

    23efd9cc16183bfc2a53fdea41ef4b3e81c5eaa3

  • SHA256

    0f74228554633caf44834a07f4c53ae07bf23e2a8dc8af3a1de6321b97235b67

  • SHA512

    b6451ba9110587f360a449e552d3fc782a0392de50ec53e1a1679d9e89aa3cfe1022086e5ec83b55f92433cd59edd7c2ae2a033eefa8b342a001926e5a5ba926

  • SSDEEP

    12288:8NymMHVQaPxowchYapwjJYjzICP5B4s/ZuW+8v:bqhYapwHCPHZ9

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

CLIENCOURS

C2

lestfuckinggoon.broke-it.net:2409

grosjeangerard.hopto.org:2409

allonsy.hopto.org:2409

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    true

  • install_flag

    false

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    XWinRemcoso

  • mouse_option

    false

  • mutex

    Rmc-IHKO1A

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2852-359-0x00000000002F0000-0x0000000000819000-memory.dmp
    .exe windows:5 windows x86


    Headers

    Sections