General

  • Target

    2044-54-0x0000000000440000-0x00000000004C0000-memory.dmp

  • Size

    512KB

  • MD5

    2c8dad3c7282b52aa26b04b7e2ebc9cf

  • SHA1

    057b3306db7e17fa1cc6c6516b6a2af52cf4a229

  • SHA256

    d6ce8a88e8df92d19aea3f6a1070fa2177d85f750e922d93c994a875733a3dbd

  • SHA512

    1cbd269b5920e5bb6adadc69b5f7bd13a39ffa3d928ea5199019991d322dfeb36fda6a12ea01e5f4f3cfe1eca0d7b15a42097d0b8841c890affe3732edd16a49

  • SSDEEP

    12288:Vnt0mUIUkq8bkOiDjqzrasHdHs/ZwxBRq:X0DI1q8bkOimHdKZa

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

LogonUI

C2

45.137.116.253:443

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    true

  • keylog_file

    Error.log

  • keylog_flag

    false

  • keylog_folder

    LogonUI

  • mouse_option

    false

  • mutex

    LogonUI-UAT1ZF

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2044-54-0x0000000000440000-0x00000000004C0000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections