General

  • Target

    2404-8-0x00000000001C0000-0x000000000023F000-memory.dmp

  • Size

    508KB

  • MD5

    8100a49a9436d8f19b055501e0b7442f

  • SHA1

    6ee7f2a23a25c0551f8806dcef6166d9a4cdd112

  • SHA256

    d85db5a3fa73fe66da4e4b10ecb9b8aee2f278d23ffe073dc21521a60cb9be52

  • SHA512

    138fa59aafd4d57721fecf9398138a61cffa4865e5ae43414fce3e41e42552f8ea7dc54d12a207f84b16050b6e1b9ffcfb742ac80a1ddd6ed7bda47a2d130b10

  • SSDEEP

    12288:tKQlA4MMM8GJDYwvgiGpr91fjnTJRQsvZbGp+DY:QQlAzd8MYEyfjnTJRLZOs

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

ROSAS

C2

newstaticfreepoint24.ddns-ip.net:3020

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    registros.dat

  • keylog_flag

    false

  • keylog_folder

    data

  • mouse_option

    false

  • mutex

    kljjbdlcjbavhbiluiewliuwqerlib-DDZVN3

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Capturas de pantalla

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2404-8-0x00000000001C0000-0x000000000023F000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections