General

  • Target

    2540-52-0x0000000000490000-0x00000000014F2000-memory.dmp

  • Size

    16.4MB

  • MD5

    c2da66eab7e006898568a1ffaab11e63

  • SHA1

    6881a57a5a7fe2e56f28a85f4e82cf2450ad8fea

  • SHA256

    975e0d88f960cc0aaec1f3c9725eab7810bceafaa0e4cb9241fb21d17fdf1806

  • SHA512

    9c79f02d6c395768e46a5a4a8792fd111e714f3a34255b51417bf74f021d2836889e858c98c373e93ed729c64c4bdea579cddf674d2875dff7fa2a05ceab3501

  • SSDEEP

    12288:JWazzTNCsnl0gfoYow2hisI53EJs/ZdFcv:pXNNnl0gfoTI53EoZ

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

64.188.27.90:2404

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-COHIYL

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2540-52-0x0000000000490000-0x00000000014F2000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections