General

  • Target

    2572-1098-0x0000000000400000-0x0000000000482000-memory.dmp

  • Size

    520KB

  • Sample

    241017-kc3pqatapp

  • MD5

    849a0c48e84646dd3a9d66a6f2268a53

  • SHA1

    1fa3fe687ae4d222884f6b073b08b206a90166e7

  • SHA256

    f6e2039aefe9f6509f20c3623f193daf533447012d8375f77516304283044251

  • SHA512

    5e3a45714c7faae93e5922b646345c0b3d2737a082a6c95b7f66a0b0a72cb213284bb4a709b808a2e5d1de7f5a44df0a7d1246c4ff5e8f954a4a383618f6d892

  • SSDEEP

    12288:QTlrYw1RUh3NFn+N5WfIQbjbs/ZXwqT4:gpRUh3NDfIQbjeZ

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

makuo

C2

remmyc.duckdns.org:57155

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-82JTYR

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      2572-1098-0x0000000000400000-0x0000000000482000-memory.dmp

    • Size

      520KB

    • MD5

      849a0c48e84646dd3a9d66a6f2268a53

    • SHA1

      1fa3fe687ae4d222884f6b073b08b206a90166e7

    • SHA256

      f6e2039aefe9f6509f20c3623f193daf533447012d8375f77516304283044251

    • SHA512

      5e3a45714c7faae93e5922b646345c0b3d2737a082a6c95b7f66a0b0a72cb213284bb4a709b808a2e5d1de7f5a44df0a7d1246c4ff5e8f954a4a383618f6d892

    • SSDEEP

      12288:QTlrYw1RUh3NFn+N5WfIQbjbs/ZXwqT4:gpRUh3NDfIQbjeZ

    Score
    1/10

MITRE ATT&CK Matrix

Tasks