General

  • Target

    3380-47-0x0000000000560000-0x00000000005E3000-memory.dmp

  • Size

    524KB

  • MD5

    8967c6bb6268b759ef9640c4fa671b4a

  • SHA1

    6f0829fcf96430f8b6622f7794500d78fd858bd7

  • SHA256

    9e6b19084b5ad1c2fada7cdada4b32352d40e0bec8f6a8a22a70624501f48ed0

  • SHA512

    4925d93f0f8f1ab460bdda25fc406a1a39ee288b46f42b4c969eeda8a2d4045b2ef36ef419f2adc9999b2e4eb953022e6cbf382868c0b699f6f7c2e8b37c536e

  • SSDEEP

    12288:KlH/GODyTg3kOIBxXKzvw7aDX7s/ZIGcvy:8/yTg3kOHMaDX+Zf

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

retghrtgwtrgtg.bounceme.net:3839

listpoints.click:7020

datastream.myvnc.com:5225

gservicese.com:2718

center.onthewifi.com:8118

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    explorer.exe

  • delete_file

    false

  • hide_file

    true

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-OPX7KW

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3380-47-0x0000000000560000-0x00000000005E3000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections