General

  • Target

    4412-11-0x0000000000400000-0x0000000000482000-memory.dmp

  • Size

    520KB

  • Sample

    240606-sx28pafh61

  • MD5

    ac7b66517a4b9e5781213a708042abaa

  • SHA1

    b62611f9b6575c32f7d1c95834b04cbf46fbebe2

  • SHA256

    4b1c314a44f6d37df1d7e75ef31cfcf98679cfabc2f1ed76e3d44f46ac373a43

  • SHA512

    8787e2b9a1e1a3c0ad41b12171e3cffe3b9202f307f7f2dc4a33dd1efaa6e65952380ccc12bfb10d63e311abf0f631db4cf26f030e5be28650f42dbd3e547300

  • SSDEEP

    6144:eXIktXfM8Lv86r9uVWAa2je4Z5zl4hgDHQQs4NTQjoHFsAOZZDAXYcNF5Gv:eX7tPMK8ctGe4Dzl4h2QnuPs/ZD0cv

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

host

C2

144.208.127.241:1717

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-UZH3LZ

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      4412-11-0x0000000000400000-0x0000000000482000-memory.dmp

    • Size

      520KB

    • MD5

      ac7b66517a4b9e5781213a708042abaa

    • SHA1

      b62611f9b6575c32f7d1c95834b04cbf46fbebe2

    • SHA256

      4b1c314a44f6d37df1d7e75ef31cfcf98679cfabc2f1ed76e3d44f46ac373a43

    • SHA512

      8787e2b9a1e1a3c0ad41b12171e3cffe3b9202f307f7f2dc4a33dd1efaa6e65952380ccc12bfb10d63e311abf0f631db4cf26f030e5be28650f42dbd3e547300

    • SSDEEP

      6144:eXIktXfM8Lv86r9uVWAa2je4Z5zl4hgDHQQs4NTQjoHFsAOZZDAXYcNF5Gv:eX7tPMK8ctGe4Dzl4h2QnuPs/ZD0cv

    Score
    1/10

MITRE ATT&CK Matrix

Tasks