General

  • Target

    2768-42-0x00000000039F0000-0x0000000003A72000-memory.dmp

  • Size

    520KB

  • MD5

    d35fdfc0898d7762ab3a85c577c77fa9

  • SHA1

    8fd06763ed183ecb2e0fe267fbfad7b78e4c65c7

  • SHA256

    0e63a06677f77d72ec21a7e4b965b7951998060d04507901cf2e6a54ff42b13f

  • SHA512

    bef85ce3050ef032b34f5cb501fd49b8e03848e768a519277f549e8923a6e700c534bf5453249ce86d431f20bf3bd66b9d3e6cf79841dc6656a5158748e8622e

  • SSDEEP

    6144:2/7iPrcL3ArwhBq7Kjsn9iHGXg0lwGS9MNNhdFvPxps9esAOZZuAXec7:2/uPq3AfK496Gw0lwGXN3p5s/Zu

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

HONEYPORT TEAM

C2

honeyportsecurityresearchteam.duckdns.org:17694

pentester0.accesscam.org:56796

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    Sharepont.exe

  • copy_folder

    Sharepoints

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Xmas-258ECQ

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2768-42-0x00000000039F0000-0x0000000003A72000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections