General

  • Target

    3a9fb5399a485d6e94d5ffe6e2349e74.bin

  • Size

    265KB

  • MD5

    11c75421faa39ae2520f07b32d0463e7

  • SHA1

    020a2716426a4c6b4f960d4ab336282465bee31a

  • SHA256

    1866a197795c790a3cf09d937703f0a20afbdba389a2a2d81fbc8b92bf4e6938

  • SHA512

    a9cf54d6cf130bbec69afd98a5a968be77601b96245583034b34ca02f0973efab06bc7864b6632da5baadce842e0fb75b273625badc7d45fa482cf5c4e8b7db3

  • SSDEEP

    6144:lVjWawTqTza4T7aMCp5h0MuDrtcjbX+Igj1iEZxeeM:6awTEza4qMC/g6Y1BZ0p

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

ezege.duckdns.org:14645

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-IVESQI

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3a9fb5399a485d6e94d5ffe6e2349e74.bin
    .zip

    Password: infected

  • 1984264959b7d63e516544cbce4b6dffb7ed5210a472437dd88068f4d39600e2.exe
    .exe windows:5 windows x86 arch:x86

    Password: infected

    8d5087ff5de35c3fbb9f212b47d63cad


    Headers

    Imports

    Sections