General

  • Target

    SOA.xlsm

  • Size

    18KB

  • Sample

    210415-ewlmjneq5n

  • MD5

    5af73df3782494331cb85c3278054f94

  • SHA1

    f4ddfd5507b0f92caec0588309d75292daa28693

  • SHA256

    eb065c4072ee30b3644a847c8f28044eb183977f39e1f90de08d098d8dd70eec

  • SHA512

    6ee5a826804664593d336a19c317e30f13f9d0d902f75bcef4668b30de08016e23a85575090248a376f5ac1afc36f13f17599b062dcf07da46eb3a8f732a4483

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://a0532749.xsph.ru/RR.exe

Extracted

Family

remcos

C2

shahzad73.ddns.net:2404

shahzad73.casacam.net:2404

Targets

    • Target

      SOA.xlsm

    • Size

      18KB

    • MD5

      5af73df3782494331cb85c3278054f94

    • SHA1

      f4ddfd5507b0f92caec0588309d75292daa28693

    • SHA256

      eb065c4072ee30b3644a847c8f28044eb183977f39e1f90de08d098d8dd70eec

    • SHA512

      6ee5a826804664593d336a19c317e30f13f9d0d902f75bcef4668b30de08016e23a85575090248a376f5ac1afc36f13f17599b062dcf07da46eb3a8f732a4483

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks