General

  • Target

    4360-41-0x0000000000400000-0x0000000000481000-memory.dmp

  • Size

    516KB

  • MD5

    b1a6ddd5e7973f50397097d0462b9e8f

  • SHA1

    e952d18801c3069c74201e43535f434b44363353

  • SHA256

    abd7127e0eb74f8f0d35e8fb09e1dc600bdb276a0608720151b964b71e2cdecf

  • SHA512

    58abe97eadd9a37c1de55cd2334c6cc52ba4b4361606f34a094fb051000e0ee204e657104dcb1818ad04c8a4691b44ad87805a3a6850fc209c5aa1f54be061e9

  • SSDEEP

    12288:GRXxReZj3WZfj/2eSseWFaIe2+f8CL47bs/ZiKPeDU:Gx7cyF2eSsewS8W47eZDP

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

167.114.189.33:2404

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-7ZDF66

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4360-41-0x0000000000400000-0x0000000000481000-memory.dmp
    .exe windows:5 windows x86


    Headers

    Sections