General

  • Target

    1820-48-0x0000000001200000-0x0000000002200000-memory.dmp

  • Size

    16.0MB

  • MD5

    b1ed4dd22c237a9dc5b8c135520a0b90

  • SHA1

    34a609b18bab9bf6cb0981985e18375d734e4678

  • SHA256

    36f4d23bf8faad45bdb8c1f5487dc69affde9da69d5ee0d0089bf8f3b2dfb22b

  • SHA512

    8bc72f6755c0381146c2214efd248ec89f1a512d30991557059a2032f1ecf9e65df6a338d06fab387ad035dc8ffdb53280b2472a572f056586f17ba1e53fe401

  • SSDEEP

    12288:E2X2Jr/rLoSJEYUs+ZeJhV3jcs/Z8Dcv2I:7IDrLoSJEAhV3jZA

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

markpeterben.duckdns.org:2404

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    vgfxdrtt

  • mouse_option

    false

  • mutex

    Rmc-7ZU9B5

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1820-48-0x0000000001200000-0x0000000002200000-memory.dmp
    .exe windows:5 windows x86 arch:x86

    8d5087ff5de35c3fbb9f212b47d63cad


    Headers

    Imports

    Sections