General

  • Target

    3780-1132-0x0000000000400000-0x0000000000482000-memory.dmp

  • Size

    520KB

  • MD5

    33a992033303e857abf5cfd26ed4cd1d

  • SHA1

    8d50fa439251dfab95e5768c04ea03b1d8901f9d

  • SHA256

    57fc40278d44994bfe2cde9ab6f9505a1e51b27eced393be7cdbeca0b6c01efa

  • SHA512

    e95e733114add7c4babd7cff4f80b7342032b52154d0553b5e96deac53bdb30bbc9e7ffd99fa1824df1a3c6d2160d533a1d2901de91da3158e6aaf2a1c6b6523

  • SSDEEP

    6144:CXIktXfM8Lv86r9uVWAa2je4Z5zl4hgDHQQs4NTQjoH4sAOZZsAX4cVH5Gv:CX7tPMK8ctGe4Dzl4h2Qnums/ZsCcv

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

PAGARE

C2

enero2024.con-ip.com:9091

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    true

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    sdfgbfsdb

  • mouse_option

    false

  • mutex

    Rmcerefbvdfbffwedcjik-RN33D8

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3780-1132-0x0000000000400000-0x0000000000482000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections