General

  • Target

    Quote#SO2021010197.pdf.exe

  • Size

    1.5MB

  • Sample

    210125-cp7m7rdlhn

  • MD5

    104064d4c0b681c9a7ae1f0c00fbff49

  • SHA1

    af273bc182f0c492520811da54165534dcf89967

  • SHA256

    5705f860865c9fd9eb6a5609d3ea183b201e72fa45db0b06be00a4a6f665f82a

  • SHA512

    2e3f19c02580d678c1726b6840cf4e31c1abe5d393f7ca773a934a7ecf2bff1fdc055c60a5b4eec99338a72641aa20c7fbd5e1ad78ec6b29e72ea55fa381b225

Malware Config

Extracted

Family

remcos

C2

91.193.75.185:1989

Targets

    • Target

      Quote#SO2021010197.pdf.exe

    • Size

      1.5MB

    • MD5

      104064d4c0b681c9a7ae1f0c00fbff49

    • SHA1

      af273bc182f0c492520811da54165534dcf89967

    • SHA256

      5705f860865c9fd9eb6a5609d3ea183b201e72fa45db0b06be00a4a6f665f82a

    • SHA512

      2e3f19c02580d678c1726b6840cf4e31c1abe5d393f7ca773a934a7ecf2bff1fdc055c60a5b4eec99338a72641aa20c7fbd5e1ad78ec6b29e72ea55fa381b225

    • Modifies WinLogon for persistence

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates physical storage devices

      Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Tasks