General

  • Target

    2588-33-0x0000000000B70000-0x0000000001BD2000-memory.dmp

  • Size

    16.4MB

  • MD5

    e260f9921c27edc8bad9e52a953fb73f

  • SHA1

    4d6a0827c25f0083c29109c6dacbf4cece6789ab

  • SHA256

    766e48dc1216e7d39358f10897c45cdc20edc32e0b0db36d640cad52784301c8

  • SHA512

    b8449d678b156d6a07844b63033905dce43ea79f63c85b3d638d89d3bbe7b56b930556c97c956eceb07c219aaf6d78d6e0b09e8cfced07116618246b64005e37

  • SSDEEP

    6144:Pg5c+EK49h3jfIofAWYw4GUwy1O4zMAbWLNEuWiP9l3rNdsAOZZ50XjczC5Gv:PeJEj9BfnYadUwuO4zMrLj/ds/Z5Ucv

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

204.10.160.176:2404

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-X42CIS

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2588-33-0x0000000000B70000-0x0000000001BD2000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections