General

  • Target

    11aaf660295ff15db27f1a6c9befbfd4.bin

  • Size

    265KB

  • MD5

    da4485ee1292fb3de929de0dc01dc503

  • SHA1

    8fc9e19f3f7c3a4a7acc8d210990023892b64698

  • SHA256

    60cceaa656d2c709986c4769b562dfd0945fd3acccae82390ee48759a66718e5

  • SHA512

    f5e4067866ee58af39ae864d09ad0a2e89ee751b755c363adbc29393cbe2a596a296695b5bd2b43fb3a06cadead9b6d1c86a5b795534a72191f099e7837afc75

  • SSDEEP

    6144:HEyHHKOP9vqhtRBdI57Mw89dQjRs923B2JSZAeHaq:HEIHFB+ty6dSRsIxsocq

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

Acople

C2

teamadmin.duckdns.org:22041

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    gwinsadmin.exe

  • copy_folder

    EuYHkOP

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    regist.dat

  • keylog_flag

    false

  • keylog_folder

    2240

  • mouse_option

    false

  • mutex

    -5LSOBH

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Capturas de pantalla

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 11aaf660295ff15db27f1a6c9befbfd4.bin
    .zip

    Password: infected

  • 73c346f861980b8ecaca38c915e2b35a9df94b1054b4d9db8afe4ae609d2eabe.exe
    .exe windows:5 windows x86 arch:x86

    Password: infected

    8d5087ff5de35c3fbb9f212b47d63cad


    Headers

    Imports

    Sections