Resubmissions

27/02/2024, 17:26

240227-vzw6kafa42 10

General

  • Target

    jailol.exe

  • Size

    430KB

  • MD5

    67eed025423ef18066b7f0edb2f76a7d

  • SHA1

    04115475368f6aeb32a6e4a69f0e5e8a766e9338

  • SHA256

    e72d948fb2c35a37f598f15e7edb648c638f720a75ddde16362804ada9777c0c

  • SHA512

    2cf2a7e0887a7ab83e24bd7212c93fa40bf777af6b56c9513e763b0d303a6b1a8940b39c71896f5d1975b08b514465afddfea78cfdb459282976c4f3b6b7da77

  • SSDEEP

    6144:NCJBSkHyP4DivRrO+d3cyU6320ho4nbJAj0N91EU7ZUFbz68AO2GjXH7ecr76B3:NCJB/RuFhU6ho0ej0N91HFAAG77YB3

Score
10/10

Malware Config

Extracted

Family

remcos

Version

4.9.3 Light

Botnet

jailol

C2

86.13.66.89:2404

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-PZXK9L

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • jailol.exe
    .exe windows:5 windows x86 arch:x86

    Password: 123

    8a3b06a792183c402d038c6ccea86944


    Headers

    Imports

    Sections