General

  • Target

    New_Payment_Advice-04-08-2021.exe

  • Size

    1.1MB

  • Sample

    210419-hzeqv897lx

  • MD5

    b406cc9e628e1622fdeb6c19bc119869

  • SHA1

    8154bf8ee1d7c43ce0743dee7c5d102e91dbea78

  • SHA256

    a16800dbbc35690f64fb554acd3bbd0d9e4f54e8404a99dac0aacc9e41916f20

  • SHA512

    d3354be9347ce446e1a4b108d309429862c48b49f99e2248c29f8224b2c7650cd70167e46560d0b96b1898a60780381f5686e1e28b060be66091a8d7a758eb75

Malware Config

Extracted

Family

remcos

C2

79.134.225.78:2404

Targets

    • Target

      New_Payment_Advice-04-08-2021.exe

    • Size

      1.1MB

    • MD5

      b406cc9e628e1622fdeb6c19bc119869

    • SHA1

      8154bf8ee1d7c43ce0743dee7c5d102e91dbea78

    • SHA256

      a16800dbbc35690f64fb554acd3bbd0d9e4f54e8404a99dac0aacc9e41916f20

    • SHA512

      d3354be9347ce446e1a4b108d309429862c48b49f99e2248c29f8224b2c7650cd70167e46560d0b96b1898a60780381f5686e1e28b060be66091a8d7a758eb75

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • UAC bypass

    • Adds policy Run key to start application

    • Executes dropped EXE

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Modify Registry

4
T1112

Discovery

System Information Discovery

1
T1082

Tasks