General

  • Target

    904-59-0x0000000072CB0000-0x0000000073F04000-memory.dmp

  • Size

    18.3MB

  • MD5

    14ca99f551294435bd29047e896423c1

  • SHA1

    f0950f8aa9296f79091ea46de3adcef4ddeb880b

  • SHA256

    f6e6e20f788ebc7bc25eaf8ef7f2c84482a61b2fc6d6c01e45d82cf130b47dc1

  • SHA512

    6a95f527381dd19ef5ed2125df66048d8f6d3097a73c0e38c9ec3a00a6973f49ded16a9e594f20a59f31bf9fa3e1d940364b623e1af5a5bddaaf47da54408570

  • SSDEEP

    6144:a6aXG1TfrymJUq7LEe7ZeBC9CIbgEVAWK9goN1dFv/xpM9SsAOZZpAXNc7ibv:PRTOmJUq8kUMIIkEVAWONjp5s/Zpubv

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

Crypted

C2

ourt2949aslumes9.duckdns.org:2401

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    true

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    paqlgkfs.dat

  • keylog_flag

    false

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    ourvbpld-RBN2WW

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 904-59-0x0000000072CB0000-0x0000000073F04000-memory.dmp
    .exe windows:5 windows x86


    Headers

    Sections