General

  • Target

    PO839-DOC83475348-834_pdf.exe

  • Size

    169KB

  • Sample

    200713-fl42sgdvje

  • MD5

    f0a88db6d16630640775a733efd9527f

  • SHA1

    88fc7c4275f93c404efa073a80ce61e0e7f3ee5a

  • SHA256

    ff3eb81477b36ac2239b623085961439379064929b20c4a69f72cb266adece83

  • SHA512

    af00550e84d345289e6d1751f42be955a3d60a2e5a4f442764dfbb044b7e0c8d775e8af89c0d217bd8023d4a4739b77600ba9365f47cde5086afead6180f6ddf

Score
10/10

Malware Config

Extracted

Family

remcos

C2

109.169.89.116:2021

Targets

    • Target

      PO839-DOC83475348-834_pdf.exe

    • Size

      169KB

    • MD5

      f0a88db6d16630640775a733efd9527f

    • SHA1

      88fc7c4275f93c404efa073a80ce61e0e7f3ee5a

    • SHA256

      ff3eb81477b36ac2239b623085961439379064929b20c4a69f72cb266adece83

    • SHA512

      af00550e84d345289e6d1751f42be955a3d60a2e5a4f442764dfbb044b7e0c8d775e8af89c0d217bd8023d4a4739b77600ba9365f47cde5086afead6180f6ddf

    Score
    10/10
    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

4
T1012

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Tasks