General

  • Target

    8bebd7cc515650c4af50bf56987bbc5959b742647333be47b810f2c7442eac71.exe

  • Size

    100KB

  • MD5

    a6a0219b8024a45895471d2373df0705

  • SHA1

    e59e9f9290097c827263db55b8896c0401234d1f

  • SHA256

    8bebd7cc515650c4af50bf56987bbc5959b742647333be47b810f2c7442eac71

  • SHA512

    c1bd154651600eec5b9bb4bdd70b99fa3a6850139d7581ece14998b3a4c2228f8c20db294d2d2366fc18935ae2cf8adbcb561f4f280cf4d841cbd30b5c0b894c

  • SSDEEP

    3072:vhzYTGWVvJ8f2v1TbPzuMsIFSHNThy+JP/P67ro:vhzOv2fM13jsIFSHNT7P/P63o

Score
10/10

Malware Config

Extracted

Family

remcos

Version

1.7 Pro

Botnet

Host

C2

185.241.208.113:2404

Attributes
  • audio_folder

    audio

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    5

  • copy_file

    JavaUpdate.exe

  • copy_folder

    JavaUpdater

  • delete_file

    true

  • hide_file

    true

  • hide_keylog_file

    false

  • install_flag

    true

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    Java

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    remcos_fcstxhoeka

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screens

  • screenshot_path

    %AppData%

  • screenshot_time

    1

  • startup_value

    Java Updater

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos family
  • detects Windows exceutables potentially bypassing UAC using eventvwr.exe 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 8bebd7cc515650c4af50bf56987bbc5959b742647333be47b810f2c7442eac71.exe
    .exe windows:4 windows x86 arch:x86

    d3a62971944197f0701c7049a9c739d1


    Headers

    Imports

    Sections