General

  • Target

    ÖİŞSHvTA-VESTEL-20210420-54 .doc

  • Size

    571KB

  • Sample

    210420-p6eah2smb2

  • MD5

    0745dc458a74f72ad039fa42490f707a

  • SHA1

    df2106969f24177a5eab2395133e7e55f6b54694

  • SHA256

    a9774fd16be147772d323568f1db15cfbb8275e4462d9356c0509c33d816e8fa

  • SHA512

    866ba0506b2c79878c32b88f1381e1183abd9fe43577acbd59aef3bd1be947d6b9d6495da3de4d66752417b86128c17ce616980db16dd7e4c263832f841d2146

Malware Config

Extracted

Family

remcos

C2

arttronova124.duckdns.org:3030

Targets

    • Target

      ÖİŞSHvTA-VESTEL-20210420-54 .doc

    • Size

      571KB

    • MD5

      0745dc458a74f72ad039fa42490f707a

    • SHA1

      df2106969f24177a5eab2395133e7e55f6b54694

    • SHA256

      a9774fd16be147772d323568f1db15cfbb8275e4462d9356c0509c33d816e8fa

    • SHA512

      866ba0506b2c79878c32b88f1381e1183abd9fe43577acbd59aef3bd1be947d6b9d6495da3de4d66752417b86128c17ce616980db16dd7e4c263832f841d2146

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • UAC bypass

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Exploitation for Client Execution

1
T1203

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Modify Registry

3
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks