General

  • Target

    2756-92-0x0000000000400000-0x0000000000483000-memory.dmp

  • Size

    524KB

  • MD5

    f9daf3ee76d5be66bb579ddb86904be0

  • SHA1

    7d6217070337209e6678783a51a2f56ec86b7880

  • SHA256

    2558faf6b9ce282c130ba695235f886228adb1f0277879d0dfa24964ef177e75

  • SHA512

    94ef55c5303823b430ddeeadcccbed019c57b0cb04665aabc69be99af4abe5fa8a76011266e9abdb365a7afdce5a726a2314a82c83cf23dada92a1455e104a74

  • SSDEEP

    6144:6XIktXfM8Lv86r9uVWAa2je4Z5zl4hgDHQQs4NTQjoH+sAOZZZAXucNZ5Gv:6X7tPMK8ctGe4Dzl4h2Qnuws/ZZqcv

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

newport2

C2

148.113.165.11:81

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    lol22424-H40VE0

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2756-92-0x0000000000400000-0x0000000000483000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections