General

  • Target

    a7cQje0wGxiZkwL.exe

  • Size

    1.1MB

  • Sample

    210414-6f4eznkm7n

  • MD5

    366d029855541c19d5951ac825e04a33

  • SHA1

    43cc316caf1cd9d3f53e0a81ef6baf0b58b8ec1b

  • SHA256

    0d0f9ca99e1de30499a97020eb01a4cda5744eadff4faf56a79f8080c515002c

  • SHA512

    fbc9ad9f3d475e208ec526b5f1c3c7b7c9c21b98c732947d041b23784473e87dbb4c091a57250eb1412a95f821382fd4aa21941e6c136ac6ab402dde8f5a70b2

Malware Config

Extracted

Family

remcos

C2

217.138.212.58:52667

Targets

    • Target

      a7cQje0wGxiZkwL.exe

    • Size

      1.1MB

    • MD5

      366d029855541c19d5951ac825e04a33

    • SHA1

      43cc316caf1cd9d3f53e0a81ef6baf0b58b8ec1b

    • SHA256

      0d0f9ca99e1de30499a97020eb01a4cda5744eadff4faf56a79f8080c515002c

    • SHA512

      fbc9ad9f3d475e208ec526b5f1c3c7b7c9c21b98c732947d041b23784473e87dbb4c091a57250eb1412a95f821382fd4aa21941e6c136ac6ab402dde8f5a70b2

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • UAC bypass

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Bypass User Account Control

1
T1088

Scheduled Task

1
T1053

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Tasks