General

  • Target

    444-32-0x0000000000400000-0x0000000000417000-memory.dmp

  • Size

    92KB

  • MD5

    de5ad6018f33d829ee61aa75e8cdc3d9

  • SHA1

    d81dda3d9b0137ea9767f71fcacb11ea9671393e

  • SHA256

    21d6921e43eb2d4908cca9fe3e1ca5e3a07eb7b02d3b387ee793d94df8c4c01f

  • SHA512

    ba21bd2be23cd595450da60da9e3252e9d33a182fb86dd7312ffa2a7770566425981fc77969200a82bc91ecdd09778b3d9fe7f69f5c526631657a8ae6257c709

  • SSDEEP

    1536:ghhW0YTGZWdVseJxaM9kraLdV2QkQ1TbPX8IHOCkIsI4ESM4NTh9E+JP19qkP6Ad:mhzYTGWVvJ8f2v1TbPzuMsIFSM4NThyk

Score
10/10

Malware Config

Extracted

Family

remcos

Version

1.7 Pro

Botnet

yankee

C2

62.102.148.156:9771

Attributes
  • audio_folder

    audio

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    5

  • copy_file

    remcos.exe

  • copy_folder

    remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    yank

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    remcos_gljlpchsrk

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screens

  • screenshot_path

    %AppData%

  • screenshot_time

    1

  • startup_value

    remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 444-32-0x0000000000400000-0x0000000000417000-memory.dmp
    .exe windows:4 windows x86 arch:x86

    d3a62971944197f0701c7049a9c739d1


    Headers

    Imports

    Sections