General

  • Target

    4160-150-0x0000000003620000-0x000000000369C000-memory.dmp

  • Size

    496KB

  • MD5

    9ad8b24e34cd84715d2cfbcbd70cef70

  • SHA1

    b1bf4e2e134f634c188108f716dc21474c2f791d

  • SHA256

    b9b48ad37e98f5082161fd8161ac2c440c8c1be7c3c6cc8955a133993c8fa60d

  • SHA512

    ec3306112396d9daae15a8b8f32a5ed0a6327e8e27abe1fca77ade773c2c2b7981f33a7eb2c30831ac3de823250bf55c89301de8c0098a253da5cd7c18735c69

  • SSDEEP

    6144:hXVUvr+eNVx6JuGD5To83sRnymABKtqulRwOJfZJEfcZdC48hAUWsAOZZ8RX7mck:hX8/Vx65HCnDAByqulR1fZJQAs/Z8

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

top.never01abuse.xyz:4186

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmcoss-AS3COA

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4160-150-0x0000000003620000-0x000000000369C000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections