General

  • Target

    2632-17-0x0000000000400000-0x0000000000482000-memory.dmp

  • Size

    520KB

  • Sample

    240703-ktb84avgpb

  • MD5

    2a54c5f4ef01284a5a80dd378fa26ac1

  • SHA1

    77bd9e8693f990e9a81d53ba8ac62e05c3f1a16a

  • SHA256

    653982648d0dbda0d2e0dd8838c202cd0b9f8f4795d59c899dd3e4c0bd6a9848

  • SHA512

    65f1527fc24866e1a5456e8cf2c6ac3c3753b0f3cff2a72788009f3cff31d564b98267bc5fc5ee35c3d0c31782723cc7c36af44b3b77352a09839bc7a909610b

  • SSDEEP

    6144:+XIktXfM8Lv86r9uVWAa2je4Z5zl4hgDHQQs4NTQjoHFsAOZZDAXYcN:+X7tPMK8ctGe4Dzl4h2QnuPs/ZD

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

newpage44.mywire.org:5010

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    skype.exe

  • copy_folder

    skype

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    true

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-GRUM7D

  • screenshot_crypt

    false

  • screenshot_flag

    true

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      2632-17-0x0000000000400000-0x0000000000482000-memory.dmp

    • Size

      520KB

    • MD5

      2a54c5f4ef01284a5a80dd378fa26ac1

    • SHA1

      77bd9e8693f990e9a81d53ba8ac62e05c3f1a16a

    • SHA256

      653982648d0dbda0d2e0dd8838c202cd0b9f8f4795d59c899dd3e4c0bd6a9848

    • SHA512

      65f1527fc24866e1a5456e8cf2c6ac3c3753b0f3cff2a72788009f3cff31d564b98267bc5fc5ee35c3d0c31782723cc7c36af44b3b77352a09839bc7a909610b

    • SSDEEP

      6144:+XIktXfM8Lv86r9uVWAa2je4Z5zl4hgDHQQs4NTQjoHFsAOZZDAXYcN:+X7tPMK8ctGe4Dzl4h2QnuPs/ZD

    Score
    1/10

MITRE ATT&CK Matrix

Tasks