General

  • Target

    COVID 19 IVN AND CREW LIST.xlsx

  • Size

    628KB

  • Sample

    210505-lj1ez6axzx

  • MD5

    c64491aa41027a5b0df3658bbc85ae47

  • SHA1

    dee8920d1755a26544f73cfbc66a0abb9aca7670

  • SHA256

    5299caa8131b3b21fb96123e8b9d0ce675bfa5287df1e0703e192e5087e40591

  • SHA512

    f70e1efab4dff9f781b7a7312cb144d8f10a5691d4b560d0b5f77a96d3d33ce66f264a7f32e061a60bfe19cfe7c74ee1974e3f1d35ffc8807b05fb7614b279a9

Score
10/10

Malware Config

Extracted

Family

remcos

C2

wedsazxcvfghyuiokjhbnvfcdsaweyplmhbvrtud.ydns.eu:1996

Targets

    • Target

      COVID 19 IVN AND CREW LIST.xlsx

    • Size

      628KB

    • MD5

      c64491aa41027a5b0df3658bbc85ae47

    • SHA1

      dee8920d1755a26544f73cfbc66a0abb9aca7670

    • SHA256

      5299caa8131b3b21fb96123e8b9d0ce675bfa5287df1e0703e192e5087e40591

    • SHA512

      f70e1efab4dff9f781b7a7312cb144d8f10a5691d4b560d0b5f77a96d3d33ce66f264a7f32e061a60bfe19cfe7c74ee1974e3f1d35ffc8807b05fb7614b279a9

    Score
    10/10
    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Exploitation for Client Execution

1
T1203

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks