General

  • Target

    New_Payment_Advice-04-08-2021.zip

  • Size

    592KB

  • Sample

    210419-mtkj679ann

  • MD5

    724f4f1e13c90ab13597019446ad5d94

  • SHA1

    709b5ff4f67fa9e1a103998f82b7f70a5f8a9a41

  • SHA256

    38083f328ed0cc2811ae4de57a23e659461b545efbaaad13e5a2abb7e3bccc27

  • SHA512

    832f766e126e67ee6779f377e3cd5b5b68f2fbb471def4a9241ace9f3e6c258b45ebe6051dc75ba865fc146fe0216e68f1aef5cb454550376766dc162fea9bb5

Malware Config

Extracted

Family

remcos

C2

79.134.225.78:2404

Targets

    • Target

      New_Payment_Advice-04-08-2021.exe

    • Size

      1.1MB

    • MD5

      b406cc9e628e1622fdeb6c19bc119869

    • SHA1

      8154bf8ee1d7c43ce0743dee7c5d102e91dbea78

    • SHA256

      a16800dbbc35690f64fb554acd3bbd0d9e4f54e8404a99dac0aacc9e41916f20

    • SHA512

      d3354be9347ce446e1a4b108d309429862c48b49f99e2248c29f8224b2c7650cd70167e46560d0b96b1898a60780381f5686e1e28b060be66091a8d7a758eb75

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • UAC bypass

    • Adds policy Run key to start application

    • Executes dropped EXE

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Modify Registry

4
T1112

Discovery

System Information Discovery

1
T1082

Tasks