General

  • Target

    1496-769-0x0000000000400000-0x0000000000482000-memory.dmp

  • Size

    520KB

  • Sample

    240827-ws5psstfmd

  • MD5

    36da43b0e325048b84023f66b0b253b2

  • SHA1

    bc3a3ef0075dfd8c4e82ee5f9f330c7903501b17

  • SHA256

    e5b15dd73c65b7e0787883a47754dea8dbd73dffe254017ccafb25655f2c95ff

  • SHA512

    61a19f0ae291e172a4c05d904c9745a8a9e7ea2c6b6ff77063e4fcdc3761f5daab7632a36f8410bf5d4424b397d262d87c9cd607846362f5cd1c49d59f384136

  • SSDEEP

    6144:2XIktXfM8Lv86r9uVWAa2je4Z5zl4hgDHQQs4NTQjoHyasAOZZDAXYcZq5Gv:2X7tPMK8ctGe4Dzl4h2Qnuwas/ZD7cv

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

45.61.132.128:1952

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-SI9ZSA

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      1496-769-0x0000000000400000-0x0000000000482000-memory.dmp

    • Size

      520KB

    • MD5

      36da43b0e325048b84023f66b0b253b2

    • SHA1

      bc3a3ef0075dfd8c4e82ee5f9f330c7903501b17

    • SHA256

      e5b15dd73c65b7e0787883a47754dea8dbd73dffe254017ccafb25655f2c95ff

    • SHA512

      61a19f0ae291e172a4c05d904c9745a8a9e7ea2c6b6ff77063e4fcdc3761f5daab7632a36f8410bf5d4424b397d262d87c9cd607846362f5cd1c49d59f384136

    • SSDEEP

      6144:2XIktXfM8Lv86r9uVWAa2je4Z5zl4hgDHQQs4NTQjoHyasAOZZDAXYcZq5Gv:2X7tPMK8ctGe4Dzl4h2Qnuwas/ZD7cv

    Score
    1/10

MITRE ATT&CK Matrix

Tasks