General

  • Target

    740-86-0x000000002D740000-0x000000002E740000-memory.dmp

  • Size

    16.0MB

  • MD5

    98ae4f93dcd2a2861c84b0754f7a8518

  • SHA1

    b03af0615f66aef31779201cfa43b066dd93bf96

  • SHA256

    ea69b9168e683a13ed2ba62300330a39729ad5a8482c3ef32e1344e8d829b02c

  • SHA512

    d7a8affc7f862f5e83eb72b0543ebf0df1cec9d8b72ae42ede003df2072f458dbdd0d3289ead427a401ebe427d995fc99ca595cbf8ab2bba8207c998e50eeac9

  • SSDEEP

    12288:zomrI4LWn+wOs6psgsm88GJu2YBVIBs/ZTZXcv:9I4jwOs6psNm2YBVIAZV

Malware Config

Extracted

Family

remcos

Botnet

UJU YAK MAY 2024

C2

myfrontmannysix.ddns.net:4939

backupfrontmanny.duckdns.org:4939

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    ioul.exe

  • copy_folder

    uiyk

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    -SNB049

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 740-86-0x000000002D740000-0x000000002E740000-memory.dmp
    .exe windows:5 windows x86 arch:x86

    8d5087ff5de35c3fbb9f212b47d63cad


    Headers

    Imports

    Sections