General

  • Target

    e54f171ba44e1007ce228fa12d46728bf01d90194efae9a537e590dcba84e682

  • Size

    265KB

  • MD5

    2d91a5e44f5388f40269e27d2cdf36b0

  • SHA1

    700db5e7110a3eeb748f552dd8ef603496478484

  • SHA256

    e54f171ba44e1007ce228fa12d46728bf01d90194efae9a537e590dcba84e682

  • SHA512

    c9d07a98de583dc646c1a98438d1fea2a836d907c2c70403ed526f5665f9fa3907685eab8895d51aa3239c4095aef314c843b576dafcb2e8a2e72a47489f2fc6

  • SSDEEP

    6144:zSzxs8J/6G3ECU/w4p3MuEGz0W2qknQNAEoOFCcvIj0OZNpd6o:z0FQbfo4Zl2yNAoFnIoIpAo

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

rxms.duckdns.org:57832

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    true

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    RmcTctTXerye8Yic-N6IQCR

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • e54f171ba44e1007ce228fa12d46728bf01d90194efae9a537e590dcba84e682
    .zip

    Password: infected

  • 3ae2a8fcc969ec131e6ea2387dbdbdc6dd9ef216fc4a04990a403b7a38494778.exe
    .exe windows:5 windows x86 arch:x86

    8d5087ff5de35c3fbb9f212b47d63cad


    Headers

    Imports

    Sections