General

  • Target

    2856-56-0x00000000731B0000-0x0000000074212000-memory.dmp

  • Size

    16.4MB

  • MD5

    e621cbb3b0e5eb0a7563eb1bc35de6ee

  • SHA1

    1d67c3f1f53f84e43db481a7cf709a045f44129d

  • SHA256

    1b7e2271051c57d30174626c5985c33081ae1065182f8dc5735d6576a91a077e

  • SHA512

    d141008cac7c6d2de9fb9cc85fdfd6e26ed7b83791bef1b65da0e4cf8753d5e0c019c1933419ec60e662051b1579dffe93e5718f84967ed7d8bc840a51628f8c

  • SSDEEP

    6144:wlCnkUUyk/XEj6iPoHAXLu1qPcYl0acpmZdLxrFTFObLMEaGcMEesAOZZqIXAcBt:wsnKXEDPogbgqkYl0ajd9Kts/Zq18v

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

209.127.186.232:4765

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-YRLOX5

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2856-56-0x00000000731B0000-0x0000000074212000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections