General

  • Target

    784-33-0x0000000072D80000-0x0000000073FD4000-memory.dmp

  • Size

    18.3MB

  • MD5

    88327913efa3db73943a4ca32f70794f

  • SHA1

    a4bc064b0395981ce407107cfa943810f1c1de4d

  • SHA256

    173e9de6c3a82e41f46ba5d120ff810dcac536497a06f28aff0ade16c6e05ef6

  • SHA512

    51d4b372266a173d2919478f049866ec57d3298d8d5a0f108d67418641652cd10921c41e68c1586dc3dc720bb4f91e09a8f6a8718ba5fc6eb31c398dccdbb9b8

  • SSDEEP

    6144:DO2fknxhmVIt5fexyqu+py8/dpLSD03dWUcQPWz2PWsAOZZgQXL5wLct05Gv:i2snvmVK2EX8y81pLSDkW/Ns/Zgvcv

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

Gift

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    true

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    kijoup.dat

  • keylog_flag

    false

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    almereits-FAJYX7

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 784-33-0x0000000072D80000-0x0000000073FD4000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections