General

  • Target

    4780-35-0x0000000000400000-0x0000000000484000-memory.dmp

  • Size

    528KB

  • MD5

    13dd819f4e372e8779de5c0a47637918

  • SHA1

    4e2e9c3f417bfebac95361844cd277b05b67f505

  • SHA256

    5e6383c2c2f86e0224f21d9151c9e7a1579756a90ad92cb11c98dbc4e43e0c89

  • SHA512

    3cf9ee176c9b8fe5c0a2469bca7886ccb3daff4fb8f92dd7461b9b94108e3e57af276292db60abfb97862a1ace8de347869163b118e1584aeb0437899048038f

  • SSDEEP

    6144:E/7iPrcL3ArwhBq7Kjsn9iHGXg0lwGS9MNNhdFvPxps9AsAOZZuAXfc787ovof:E/uPq3AfK496Gw0lwGXN3pHs/Zu+8vo

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

listpoints.online:4050

retghrtgwtrgtg.bounceme.net:3839

listpoints.click:7020

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    explorer.exe

  • delete_file

    false

  • hide_file

    true

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-WLPZI6

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4780-35-0x0000000000400000-0x0000000000484000-memory.dmp
    .exe windows:5 windows x86


    Headers

    Sections