General

  • Target

    2632-52-0x00000000702F0000-0x0000000071352000-memory.dmp

  • Size

    16.4MB

  • MD5

    baa6adf37f799dd1f65d2299f5a8a079

  • SHA1

    952c41b4ccfb4208f9d6ed0a72d3180ba0c8b937

  • SHA256

    2f3cc9efb964e041ae01100e92d02787c32564d73bff4229571f7d73e1229a11

  • SHA512

    9c30a1f0dcad921a093af8d4c57a40626b00fe4532cc729a205c0b3ff6cc04afe2e1d3e2ec3926ac8eb168694536806c6f4c71851841ac4b2d8572e96e7b9dd1

  • SSDEEP

    6144:jS4ipw4gaJ1wR5i+nZF8RMgSwikZoTD6VmkynPTYUHLrlRpsAOZZOEXTcRf7ov:jdiPgacRYqZwzZoTDYyPJs/ZOj8v

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

94.156.6.57:6657

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-D3X3WS

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2632-52-0x00000000702F0000-0x0000000071352000-memory.dmp
    .exe windows:5 windows x86


    Headers

    Sections