General

  • Target

    3188-21-0x0000000000400000-0x0000000000482000-memory.dmp

  • Size

    520KB

  • MD5

    03332bde2849abf9b96f316d09b8a550

  • SHA1

    aa8d23f170191ebe02bc9c41f1a14403405c8c3c

  • SHA256

    09d1931ea68ba918715311efc973b5a56a699ae8eef1dd08f3cd54829b4f02c2

  • SHA512

    e827ed591bb4cdc92ca957ad94228074e51d3aeab9765457744a95fccd281db2cb98c3cd0322749d58b8fce07d10e55476bea362bb436db5a6c17089b349c08e

  • SSDEEP

    6144:8XIktXfM8Lv86r9uVWAa2je4Z5zl4hgDHQQs4NTQjoHFsAOZZsAX4csG5Gv:8X7tPMK8ctGe4Dzl4h2QnuPs/Zskcv

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

185.222.58.40:1990

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    true

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-IJU1NL

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3188-21-0x0000000000400000-0x0000000000482000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections