General

  • Target

    00f66290090abad9e0c8a98e659723a29ad621862a54ff7b67dc326b4cf74ae6N.exe

  • Size

    465KB

  • MD5

    c52987ac16d800661b0673db0e88e040

  • SHA1

    8887a9096dd5baa81fc841fd4066978aabc66d66

  • SHA256

    00f66290090abad9e0c8a98e659723a29ad621862a54ff7b67dc326b4cf74ae6

  • SHA512

    5431218a44e0a26337b6ad78f4cf225c735a104751a542cb7d882e69ba711b3001d855199c7b91d6113eca2095257daacbb642cf1e84fa1c11e913f5d401782d

  • SSDEEP

    12288:wPZmBcv4pc/FIz46LEM3b3dEeDCEjqT+PZmpM:whmqec/b65r0EEAZ

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

23.ip.gl.ply.gg:24321

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    Rmc.exe

  • copy_folder

    RootRmc

  • delete_file

    true

  • hide_file

    true

  • hide_keylog_file

    false

  • install_flag

    true

  • install_path

    %SystemDrive%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-M1WJOM

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 00f66290090abad9e0c8a98e659723a29ad621862a54ff7b67dc326b4cf74ae6N.exe
    .dll windows:5 windows x86 arch:x86

    e27f31bfe821fd0b33dae8eb62c1c0b8


    Headers

    Imports

    Sections