General

  • Target

    1722001145c8336cb6887f0bbe0b12744f5c43638979603a57a5fc96eb7f34015fb312b4f7920.dat-decoded.exe

  • Size

    483KB

  • MD5

    7bccbac8a232ff442b0840adcc1eb718

  • SHA1

    e2800e1cfb0beaddadcf275d0f07c8aab27259c5

  • SHA256

    2c4b0e1df5a390f1dd275ba8bcf16ed61c411c5d8a076094f7614384ca28d865

  • SHA512

    62fae04fe37a7e7834df89f6b8f5d0353e0bfb31ff03559618b73a0bc609dc161a9740b92fab24d672d8d60f2efd08d37a417397c1a9187375b5fe3edefac81c

  • SSDEEP

    6144:HXIktXfM8Lv86r9uVWAa2je4Z5zl4hgDHQQs4NTQjoHFsAOZZ5AXIcNH5Gv:HX7tPMK8ctGe4Dzl4h2QnuPs/Z5icv

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

zynova

C2

2024remcmon.duckdns.org:14645

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-R2I0JW

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1722001145c8336cb6887f0bbe0b12744f5c43638979603a57a5fc96eb7f34015fb312b4f7920.dat-decoded.exe
    .exe windows:5 windows x86 arch:x86

    8d5087ff5de35c3fbb9f212b47d63cad


    Headers

    Imports

    Sections