General

  • Target

    New PO.doc

  • Size

    1.3MB

  • Sample

    210108-lmzmcqgx8e

  • MD5

    3e734589bebe665471dec5c6342b1df3

  • SHA1

    08a241bc943f69b937e6df4bd231d19d81b84128

  • SHA256

    88478956ea6c8ea5423e2c30e23fbbf893f4ebbcaa3718d407ac418bf9964c0e

  • SHA512

    15463cf5f247f8d6b9abfbd8697e82a06ac61dea918b64b6668fdb281e39d28d61bcd9b9a5cb14e2375b6998f0872e4018e442eba83f02ddbfefd359234e02ec

Score
10/10

Malware Config

Targets

    • Target

      New PO.doc

    • Size

      1.3MB

    • MD5

      3e734589bebe665471dec5c6342b1df3

    • SHA1

      08a241bc943f69b937e6df4bd231d19d81b84128

    • SHA256

      88478956ea6c8ea5423e2c30e23fbbf893f4ebbcaa3718d407ac418bf9964c0e

    • SHA512

      15463cf5f247f8d6b9abfbd8697e82a06ac61dea918b64b6668fdb281e39d28d61bcd9b9a5cb14e2375b6998f0872e4018e442eba83f02ddbfefd359234e02ec

    Score
    10/10
    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Exploitation for Client Execution

1
T1203

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Command and Control

Web Service

1
T1102

Tasks