General

  • Target

    620-57-0x000000001E1F0000-0x000000001E272000-memory.dmp

  • Size

    520KB

  • MD5

    5fd67e940c937d2ed32848f798a1408c

  • SHA1

    b1141b25a23b292523b430463f3df0382ff5b481

  • SHA256

    57e92c92635430e7dc3ea5c20e6c352a912cac7f8684f9985e77ec7b693d23cf

  • SHA512

    45e1a8da0a1a2479eb5be4ad2bc66c0413a9206cc11e05404d7e242431a341c1a454465ce4cc52961c81ee28e91560697748f753adbdb9c7131127219cd03a91

  • SSDEEP

    6144:dag664mLj3mszYXgEcIoF2hMGtug7odaWS4i2tH/pcB/5sAOZZKMX9ceF5Gv:dal6XL7dcwDIoFeMGtuVdD6s/ZKWcv

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

DOLLAR

C2

107.175.229.139:8087

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-UZXQ9B

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 620-57-0x000000001E1F0000-0x000000001E272000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections