General

  • Target

    640-7-0x00000000279A0000-0x00000000289A0000-memory.dmp

  • Size

    16.0MB

  • MD5

    9fefd1b57d692f6ddde02c8571583cb0

  • SHA1

    edb2869623b3596b22398e7a55d4d9de99228875

  • SHA256

    0b00474dc0355c154fdb9486509485e6c697789cb429242c76feb9049065381d

  • SHA512

    03b054401511427815932ee0d1ecad159f1ce1b476b0a43ae666c4fb013af6c1695b11debc3a571331baf6d02b891fbe57fa3c6d2408ea965888bd733109bbb6

  • SSDEEP

    12288:6ciTdHo4y8Ua1cgUP8yJ2159ds/ZT+fuRcv:SI4y8Ua1c7c59sZ

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

timeisnow.duckdns.org:4343

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-6P097R

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    5

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 640-7-0x00000000279A0000-0x00000000289A0000-memory.dmp
    .exe windows:5 windows x86 arch:x86

    8d5087ff5de35c3fbb9f212b47d63cad


    Headers

    Imports

    Sections