General

  • Target

    2788-12-0x0000000000400000-0x0000000000482000-memory.dmp

  • Size

    520KB

  • MD5

    21ce0f5b5b152c21d68af2aee1ccd821

  • SHA1

    387d77f16faf3b15265afa2595f7445b8202f571

  • SHA256

    fa2049d068659f49bd399c085435083b913d91a0ef73588faeb7914bd21d13db

  • SHA512

    8e1d70b356744ce46d32380f8994f10f664b37f2d50b93d859ff535f12e2d2f8378f4bf5a58f89ecd5cc38b4ab896ead88e56ec07c665b0ea2ca040c81194591

  • SSDEEP

    6144:wTz+c6KHYBhDc1RGJdv//NkUn+N5Bkf/0TELRvIZPjbsAOZZBAXccrGT4:wTlrYw1RUh3NFn+N5WfIQIjbs/ZBJT4

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

Elroi

C2

75.127.7.188:2404

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    ExtExports.exe

  • copy_folder

    Microsoft

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    true

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    Windows

  • mouse_option

    false

  • mutex

    Rmc-ROJHB5

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2788-12-0x0000000000400000-0x0000000000482000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections