General

  • Target

    1908-19-0x0000000000400000-0x0000000000482000-memory.dmp

  • Size

    520KB

  • Sample

    240930-leq95sxemp

  • MD5

    d95abee7e9b228595a8dfbbf9a23d817

  • SHA1

    7ca2e581454c288db1d3a0a7023af8a22b671d52

  • SHA256

    b0937838dc41174ef07d016b62f4cca04385a7a49c4b5b159ee1c446d59f6d59

  • SHA512

    0cabab5d6f75faa177755acac6ebdb97e0230d2cda2dfda0be4e116c2cef6fc98e9438b247cd31002cfc8003354451ceaca88ddf98a48fd61db26c468fe14323

  • SSDEEP

    6144:bTz+c6KHYBhDc1RGJdv//NkUn+N5Bkf/0TELRvIZCjbsAOZZmAX4cr5T4:bTlrYw1RUh3NFn+N5WfIQxjbs/ZmuT4

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

103.186.116.220:6565

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-9XV80Z

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      1908-19-0x0000000000400000-0x0000000000482000-memory.dmp

    • Size

      520KB

    • MD5

      d95abee7e9b228595a8dfbbf9a23d817

    • SHA1

      7ca2e581454c288db1d3a0a7023af8a22b671d52

    • SHA256

      b0937838dc41174ef07d016b62f4cca04385a7a49c4b5b159ee1c446d59f6d59

    • SHA512

      0cabab5d6f75faa177755acac6ebdb97e0230d2cda2dfda0be4e116c2cef6fc98e9438b247cd31002cfc8003354451ceaca88ddf98a48fd61db26c468fe14323

    • SSDEEP

      6144:bTz+c6KHYBhDc1RGJdv//NkUn+N5Bkf/0TELRvIZCjbsAOZZmAX4cr5T4:bTlrYw1RUh3NFn+N5WfIQxjbs/ZmuT4

    Score
    1/10

MITRE ATT&CK Matrix

Tasks