General

  • Target

    QuotationQO210421A87356_samples_products_Sinoma_Internationals.doc

  • Size

    1.3MB

  • Sample

    210421-91xkmjcpb2

  • MD5

    ed8d3d16c7f99644bc0d8d42590a88bf

  • SHA1

    445cc2781d3df0d688aa2566f37e368dbd5fe79e

  • SHA256

    fca327a07db22999539c70fd7720c712e90780a04144bbb7fc3f27fd77d68a7c

  • SHA512

    d63c15190bd556a56a38759eb577674da62a51ed729cd292c6ed8baef885661f004f470ed13e313caf0fb40b768da826802bf0a83c5d05f28776fe8d62d67d83

Score
10/10

Malware Config

Extracted

Family

remcos

C2

46.183.220.61:2404

Targets

    • Target

      QuotationQO210421A87356_samples_products_Sinoma_Internationals.doc

    • Size

      1.3MB

    • MD5

      ed8d3d16c7f99644bc0d8d42590a88bf

    • SHA1

      445cc2781d3df0d688aa2566f37e368dbd5fe79e

    • SHA256

      fca327a07db22999539c70fd7720c712e90780a04144bbb7fc3f27fd77d68a7c

    • SHA512

      d63c15190bd556a56a38759eb577674da62a51ed729cd292c6ed8baef885661f004f470ed13e313caf0fb40b768da826802bf0a83c5d05f28776fe8d62d67d83

    Score
    10/10
    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Exploitation for Client Execution

1
T1203

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks