General

  • Target

    1764-13-0x0000000027D00000-0x0000000028D00000-memory.dmp

  • Size

    16.0MB

  • Sample

    240517-nyh4zsgc33

  • MD5

    04ca1e20b9e9ec4a3eca8ccc9fcf0c1b

  • SHA1

    c5fd41618cd47967816834113312f9b6e2ab4a89

  • SHA256

    59710e2f1f540113e5f86cf4915e7c5edb8e9273c7ffdbceb2c0ba54d75bbbaa

  • SHA512

    0d5fde97abd29f865254de55c95c24c8c7c67e2da630b4f1cab22c42e75c0e9647780f8defcffa0fbe61e32aeb27e57269ec1c38a684f5d6ea493695d15ac0d1

  • SSDEEP

    12288:NPmUhjREy9R04jE0IsWGovEDbxQs/Z3Xcv:Jrj6IR04jEXsxbx7Z

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

FmGlobal

C2

royaldachpharmacy.duckdns.org:6395

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    services.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    true

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-GRT17F

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      1764-13-0x0000000027D00000-0x0000000028D00000-memory.dmp

    • Size

      16.0MB

    • MD5

      04ca1e20b9e9ec4a3eca8ccc9fcf0c1b

    • SHA1

      c5fd41618cd47967816834113312f9b6e2ab4a89

    • SHA256

      59710e2f1f540113e5f86cf4915e7c5edb8e9273c7ffdbceb2c0ba54d75bbbaa

    • SHA512

      0d5fde97abd29f865254de55c95c24c8c7c67e2da630b4f1cab22c42e75c0e9647780f8defcffa0fbe61e32aeb27e57269ec1c38a684f5d6ea493695d15ac0d1

    • SSDEEP

      12288:NPmUhjREy9R04jE0IsWGovEDbxQs/Z3Xcv:Jrj6IR04jEXsxbx7Z

    Score
    1/10

MITRE ATT&CK Matrix

Tasks