General

  • Target

    d458b313f33fbae156107a5c0967fb00_NeikiAnalytics.exe

  • Size

    124KB

  • MD5

    d458b313f33fbae156107a5c0967fb00

  • SHA1

    3b90a0e8d0c3a1e68b6f0484855880cc84de5ac1

  • SHA256

    7fda2de1ea6bd7f122cd9ea8afd68d34b6eed470a1e9cf4d4fe0f6acb9744fa1

  • SHA512

    6bf708075bab9f66216f2a0e8c6f1ccac38d819f2df3636c8a49db588f0111b950989d4d7ad8523eb07263cd3d4ef72407682d972428e46daf1d6b4894fada74

  • SSDEEP

    3072:4d8jGSsTMh7pqhCiE5xc4UbzKU4OzqhEwrc+5:kuGrQ7qE5xcUdOzqhE8

Score
10/10

Malware Config

Extracted

Family

remcos

Version

2.4.5 Pro

Botnet

Remote%Host

C2

www.rmagent.biz:7181

Attributes
  • audio_folder

    MicRecords

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    vbs.server.exe

  • copy_folder

    vbs.server

  • delete_file

    true

  • hide_file

    true

  • hide_keylog_file

    false

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    Remcos-00GA1C

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    vbs.server

  • take_screenshot_option

    false

  • take_screenshot_time

    5

  • take_screenshot_title

    wikipedia;solitaire;

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • d458b313f33fbae156107a5c0967fb00_NeikiAnalytics.exe
    .exe windows:4 windows x86 arch:x86

    e614da0834fa05db0c29913dd3f46013


    Headers

    Imports

    Sections