General

  • Target

    2904-10-0x0000000000400000-0x0000000000419000-memory.dmp

  • Size

    100KB

  • MD5

    6874c74a1b8aec8b4f8598b5cb442992

  • SHA1

    c5276139ab612a9d9c2f37b5193669c7f078399e

  • SHA256

    980beac020158c2fd8ad9d5c56509bf4dc1c4855c06a452e1992baf1bbd94c56

  • SHA512

    396c5a97165fbd2931ab13799acce7049b6c0f86a74e28372ba40c1fe1714d7d9d51f1a2574ecc47beada06bd60358d51e92bc727cd3745bdc0888e85cacbf5a

  • SSDEEP

    3072:xhzYTGWVvJ8f2v1TbPzuMsIFSWNThOSmr:xhzOv2fM13jsIFSWNTYSW

Score
10/10

Malware Config

Extracted

Family

remcos

Version

1.7 Pro

Botnet

Host

C2

185.241.208.113:2404

Attributes
  • audio_folder

    audio

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    5

  • copy_file

    JavaUpdate.exe

  • copy_folder

    JavaUpdater

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    true

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    Java

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    remcos_klbwfjyviz

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screens

  • screenshot_path

    %AppData%

  • screenshot_time

    1

  • startup_value

    Java Updater

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2904-10-0x0000000000400000-0x0000000000419000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections