General

  • Target

    4464-41-0x0000000000DA0000-0x0000000001FF4000-memory.dmp

  • Size

    18.3MB

  • Sample

    240208-jmf32abf3w

  • MD5

    77ab096ae8278b425b76b7d2c5ade7fc

  • SHA1

    44ef09ffe9b4b8c20972286d3b0c040343b9bd05

  • SHA256

    eb689930e911187a4936fd8f9bd496bc7d57ddcc6a992e15ebdfad6b213a5c86

  • SHA512

    8d4ceed86ead0f7d90bedc694b4cb8c2d7a2f6c87ebf022f89b07f299e9e24e508d56b8b759232ac5b184af319467e92926cf39721261125213c7a98a6911567

  • SSDEEP

    6144:LKHy07ZZa6T7GJm+mOxOwyO9FDuvYSYRGI0sF9QjoHasAOZZsAX4cNc5Gv:LKR7/asa4LYOwyCFDuvAGzsUs/Zs5cv

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

Top

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    true

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    mqerms.dat

  • keylog_flag

    false

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    alpwovnb-G3F5OR

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      4464-41-0x0000000000DA0000-0x0000000001FF4000-memory.dmp

    • Size

      18.3MB

    • MD5

      77ab096ae8278b425b76b7d2c5ade7fc

    • SHA1

      44ef09ffe9b4b8c20972286d3b0c040343b9bd05

    • SHA256

      eb689930e911187a4936fd8f9bd496bc7d57ddcc6a992e15ebdfad6b213a5c86

    • SHA512

      8d4ceed86ead0f7d90bedc694b4cb8c2d7a2f6c87ebf022f89b07f299e9e24e508d56b8b759232ac5b184af319467e92926cf39721261125213c7a98a6911567

    • SSDEEP

      6144:LKHy07ZZa6T7GJm+mOxOwyO9FDuvYSYRGI0sF9QjoHasAOZZsAX4cNc5Gv:LKR7/asa4LYOwyCFDuvAGzsUs/Zs5cv

    Score
    1/10

MITRE ATT&CK Matrix

Tasks