General

  • Target

    580-68-0x0000000000400000-0x0000000000417000-memory.dmp

  • Size

    92KB

  • MD5

    0380ae1746be40d7a2c6b474f57d5dc5

  • SHA1

    44542f0e5eb6c9f0c7462bdf584c310e937cd110

  • SHA256

    294df870cd7be95b4e1fecfbdc7549f71d0edaa71a6a6c2798518dcfa97d1eab

  • SHA512

    2dfcf8f934fe4b0ada25a89d9a4d17d2028471a2099f83867bdc2f9a8e1829d32d14018f69908830e0a52f44d90625e13b7b2b948f8ed04702eb01312d52da2f

  • SSDEEP

    1536:YhhW0YTGZWdVseJxaM9kraLdV2QkQ1TbPX8IHOCkIsI4ESHNTh9E+JP19qkP6hrg:+hzYTGWVvJ8f2v1TbPzuMsIFSHNThy+x

Score
10/10

Malware Config

Extracted

Family

remcos

Version

1.7 Pro

Botnet

june

C2

178.162.212.214:9625

Attributes
  • audio_folder

    audio

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    5

  • copy_file

    remcos.exe

  • copy_folder

    remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    new start

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    remcos_akrlacyxljjkhjki88hgvjh

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screens

  • screenshot_path

    %AppData%

  • screenshot_time

    1

  • startup_value

    remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 580-68-0x0000000000400000-0x0000000000417000-memory.dmp
    .exe windows:4 windows x86 arch:x86

    d3a62971944197f0701c7049a9c739d1


    Headers

    Imports

    Sections