General

  • Target

    2580-20-0x00000000728A0000-0x0000000073902000-memory.dmp

  • Size

    16.4MB

  • MD5

    1d1b716f9637fac056b5e15b9d1f4f16

  • SHA1

    fcedcd71675e4ad66f522de1e310d2dff525c48f

  • SHA256

    235ad1fb0954f099901023da12a986eaf83e5fc263cbc615454f28019635a373

  • SHA512

    917ffe595f47eba11b8217189ad35f41d8fbb5ef06a6186b79622a2fe728602619343867100462c556d0e27c4b6b2a4b0ff100f860ebd5c3619fbc4221f7e2a1

  • SSDEEP

    6144:iHOT59fonvAbGcOjwzBKDujn48t8WqZwhVhNxrxRQtRUMsAOZZC4XGcPu57ov:iuTTqvA/O8dquj48t8WbVXBMs/ZCF8v

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

198.55.113.202:2404

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-V3UC60

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2580-20-0x00000000728A0000-0x0000000073902000-memory.dmp
    .exe windows:5 windows x86


    Headers

    Sections