General

  • Target

    2932-550-0x0000000000400000-0x000000000047F000-memory.dmp

  • Size

    508KB

  • MD5

    fe63970556d3d2c75abbd05f2488a3c4

  • SHA1

    77474e911c603892f07b7f072bdfc4b89051475d

  • SHA256

    1b90d3b3d68bfdc052e1de12ba004b37306659650ea6802101c32e6cf84353d2

  • SHA512

    147179b671c310a0c5fe3b06b79b1cc82d0f9a192d8b981aa4b6e303e598ae887409a4ac1253ca473940ba55dc138913a115f28cd96bf2c4331cb04b8d3f5015

  • SSDEEP

    12288:Wmnk7iLJbpIpiRL6I2WhSKQ9ZsfZQSsE:uiLJbpI7I2WhQqZ7sE

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

765436

C2

fujailrahgold.com:2110

windowsupdate2024.duckdns.org:2110

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    6438744-54LE8I

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2932-550-0x0000000000400000-0x000000000047F000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections