General

  • Target

    2712-39-0x0000000000400000-0x000000000047F000-memory.dmp

  • Size

    508KB

  • Sample

    240924-r23jkssfrc

  • MD5

    e4ea83273ac5b7d482c0d11881674778

  • SHA1

    ee31ec74ace0d58799d6676348eb915cb9cd50bc

  • SHA256

    aeb586bc1ce5b6e247fdd0d41d1fe32e9c3779ac7cd0fac4c8470737d8679a67

  • SHA512

    d0ebb98ce7115d7d09f7aa73dcb9dd5cdb275bbc1b56d770e0f75921c49c429e7968d7b15e591f425eddf8f48892527e6e4f58ff4be95aff5a4da433401e6a46

  • SSDEEP

    12288:Wmnk7iLJbpIpiRL6I2WFKQ9ZsfZQSBn9:uiLJbpI7I2WHqZ7B9

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

127.0.0.1:59321

nnamoo.duckdns.org:59321

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-41EVS0

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      2712-39-0x0000000000400000-0x000000000047F000-memory.dmp

    • Size

      508KB

    • MD5

      e4ea83273ac5b7d482c0d11881674778

    • SHA1

      ee31ec74ace0d58799d6676348eb915cb9cd50bc

    • SHA256

      aeb586bc1ce5b6e247fdd0d41d1fe32e9c3779ac7cd0fac4c8470737d8679a67

    • SHA512

      d0ebb98ce7115d7d09f7aa73dcb9dd5cdb275bbc1b56d770e0f75921c49c429e7968d7b15e591f425eddf8f48892527e6e4f58ff4be95aff5a4da433401e6a46

    • SSDEEP

      12288:Wmnk7iLJbpIpiRL6I2WFKQ9ZsfZQSBn9:uiLJbpI7I2WHqZ7B9

    Score
    1/10

MITRE ATT&CK Matrix

Tasks