General

  • Target

    Backdoor.exe

  • Size

    92KB

  • MD5

    62e0d4fab051f1d20d9ccc740f29a892

  • SHA1

    94f377ee56dcff9ffb9b08cac9eef023d9de53db

  • SHA256

    e6817cfed2b621a7695adafa26c08460f4ac38a0f2a8c5cdc5906d69672d3ffa

  • SHA512

    b0606aa90dfdae577cb8522e6f2d4992a325b2419b9f88a016353ed8bfce8cb2d85ed28e46353a1cf602389bf6d49e79ac4cd83f74685d271208d7bd381e5b92

  • SSDEEP

    1536:4hhW0YTGZWdVseJxaM9kraLdV2QkQ1TbPX8IHOCkIsI4ESHNTh9E+JP19qkP6vrK:ehzYTGWVvJ8f2v1TbPzuMsIFSHNThy+Z

Score
10/10

Malware Config

Extracted

Family

remcos

Version

1.7 Pro

Botnet

Host

C2

anyone-blogging.gl.at.ply.gg:22284

Attributes
  • audio_folder

    audio

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    5

  • copy_file

    PowerShell.exe

  • copy_folder

    Windows

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    true

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    remcos_xuvodfwuhh

  • screenshot_crypt

    false

  • screenshot_flag

    true

  • screenshot_folder

    Screens

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    WinShell

  • take_screenshot_option

    true

  • take_screenshot_time

    5

  • take_screenshot_title

    password

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Backdoor.exe
    .exe windows:4 windows x86 arch:x86

    d3a62971944197f0701c7049a9c739d1


    Headers

    Imports

    Sections