General

  • Target

    3212-4-0x0000000000400000-0x0000000000421000-memory.dmp

  • Size

    132KB

  • MD5

    00614cb83da6d821763f812026daa503

  • SHA1

    3923163b5eca04a288e12541eecf0065273086b4

  • SHA256

    85f930fe768c28aa4fbf4cdb74d6181fd49a6746b1a5adf8ba4c9bbc37e8fe7b

  • SHA512

    a562efb44312d3b0dfe2954c8c8ee063b6d4915b207dcdba2f1d48712766df5d5a34763c2f92355fa3fde0eae3e6649653b419c7def462224ad6a1d877cd88a1

  • SSDEEP

    3072:G4XgM0gTUJNFbnOabI/JZ7k0qvo7wvdbnrlSl26FaqmrzqhEbMA2hr5:5XgMtwNFbOabI/qxlSl26FaFrzqhEs5

Score
10/10

Malware Config

Extracted

Family

remcos

Version

2.7.2 Pro

Botnet

RemoteHost

C2

185.140.53.144:8691

Attributes
  • audio_folder

    MicRecords

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    dancas

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    Amdosc-JSJ6ES

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

  • take_screenshot_title

    wikipedia;solitaire;

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3212-4-0x0000000000400000-0x0000000000421000-memory.dmp
    .exe windows:4 windows x86 arch:x86

    fa1107e773796a494c44045d5372098c


    Headers

    Imports

    Sections