General

  • Target

    2764-22-0x0000000072CC0000-0x0000000073D22000-memory.dmp

  • Size

    16.4MB

  • MD5

    4a1c3375864f43eb8d8021306c9a8757

  • SHA1

    61f56ffde7d429d311a70945344f213b5624ed13

  • SHA256

    2371ec9409119194ba9a6719119de85615063c5939a1607b50691ef7881fb823

  • SHA512

    10c58200601354311ab9ec9ee64aa55873fd5af675319b88d665be4adf19f1769ee9d62e72ac42c1bb1699258264c97341b8f602b5a0e0a757eea344abc8d5d6

  • SSDEEP

    6144:e/7iPrcL3ArwhBq7Kjsn9iHGXg0lwGS9MNNhdFvPxps9GsAOZZuAXec7q7ov:e/uPq3AfK496Gw0lwGXN3pxs/ZuH8v

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

172.93.217.218:2404

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-MV3HJH

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2764-22-0x0000000072CC0000-0x0000000073D22000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections