General

  • Target

    896-1092-0x0000000072D70000-0x0000000073DD2000-memory.dmp

  • Size

    16.4MB

  • MD5

    03ca368656abc2d2aa6adcb00c30e482

  • SHA1

    7068dba55ee6659be361b5af9d09801293027014

  • SHA256

    dbece4c75f946958e711ec23308e136fa75e59fa0d9862582d545307d9d5594b

  • SHA512

    fc1de4a464a6554048f574fcddde2555d762b6438cddcef31cfc35ac5b5cda209825ea60822583abfe93d8249fc5868e2ccc3ef6e17db6a77ab362c11086f3fd

  • SSDEEP

    12288:r1nP6eBZ0PdQ1RmPEVAWONjpzs/Zpubv:E1dQ1RmzNjp2Z

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

Crypted

C2

ourt2949aslumes9.duckdns.org:2401

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    true

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    paqlgkfs.dat

  • keylog_flag

    false

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    ourvbpld-RBN2WW

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 896-1092-0x0000000072D70000-0x0000000073DD2000-memory.dmp
    .exe windows:5 windows x86


    Headers

    Sections