General

  • Target

    2168-135-0x0000000000400000-0x0000000000482000-memory.dmp

  • Size

    520KB

  • MD5

    9e47a35c07253bd25e7d393bc84b60d3

  • SHA1

    0418be53678324bd7ca8e341cb8069f70e47291c

  • SHA256

    10c847af6e9e9a6f87f9c8e8b17d5344a908b0ee2ec5d19835468cf1ac50bbf7

  • SHA512

    2c4bb55e9be8d06d21a837bbbe62d94ffeeec237008adc5532c44b0bde5a4bfbc4a7a73e8b0baa8c93f38598c673ffaa446174b290f6877479c2c3b913c6ead4

  • SSDEEP

    6144:sXIktXfM8Lv86r9uVWAa2je4Z5zl4hgDHQQs4NTQjoHFsAOZZDAXYcN:sX7tPMK8ctGe4Dzl4h2QnuPs/ZD

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

MONDAY SHIT

C2

192.3.216.140:22337

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-JAF1GG

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2168-135-0x0000000000400000-0x0000000000482000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections