64e3a0b3d39e61ab529cc4f9a7528d1d

General
Target

64e3a0b3d39e61ab529cc4f9a7528d1d

Size

917KB

Sample

210915-hm325aaab9

Score
10 /10
MD5

64e3a0b3d39e61ab529cc4f9a7528d1d

SHA1

3149dbd400836e7db81c5e2bef130e470057b600

SHA256

8a0f8162ea104c59ca502748f5d4c72d930d21d59d23b0dde2fb6b5fec69947f

SHA512

3d024537168ab19dd2ab38b0bb89a86b2473f9614a4dce021c87fdc0c3a220986a5e2360dec04bddd25519ee20f89d41c740d10364f0f1272505922c3770c3fa

Malware Config

Extracted

Family remcos
Version 3.2.0 Pro
Botnet RemoteHost
C2

freelife.hopto.org:2404

freelife1.hopto.org:2404

freelife2.hopto.org:2404

freelife01.hopto.org:2404

freelife3.hopto.org:2404

freelife4.hopto.org:2404

freelife5.hopto.org:2404

Attributes
audio_folder
MicRecords
audio_path
%AppData%
audio_record_time
5
connect_delay
0
connect_interval
1
copy_file
remcos.exe
copy_folder
Remcos
delete_file
false
hide_file
false
hide_keylog_file
false
install_flag
false
install_path
%AppData%
keylog_crypt
false
keylog_file
logs.dat
keylog_flag
false
keylog_folder
remcos
keylog_path
%AppData%
mouse_option
false
mutex
pastananiceforwhat-QQD2AI
screenshot_crypt
false
screenshot_flag
false
screenshot_folder
Screenshots
screenshot_path
%AppData%
screenshot_time
10
startup_value
Remcos
take_screenshot_option
false
take_screenshot_time
5
take_screenshot_title
notepad;solitaire;
Targets
Target

64e3a0b3d39e61ab529cc4f9a7528d1d

MD5

64e3a0b3d39e61ab529cc4f9a7528d1d

Filesize

917KB

Score
10 /10
SHA1

3149dbd400836e7db81c5e2bef130e470057b600

SHA256

8a0f8162ea104c59ca502748f5d4c72d930d21d59d23b0dde2fb6b5fec69947f

SHA512

3d024537168ab19dd2ab38b0bb89a86b2473f9614a4dce021c87fdc0c3a220986a5e2360dec04bddd25519ee20f89d41c740d10364f0f1272505922c3770c3fa

Tags

Signatures

  • Remcos

    Description

    Remcos is a closed-source remote control and surveillance software.

    Tags

  • Blocklisted process makes network request

  • Adds Run key to start application

    Tags

    TTPs

    Registry Run Keys / Startup Folder Modify Registry

Related Tasks

MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
        Discovery
          Execution
            Exfiltration
              Impact
                Initial Access
                  Lateral Movement
                    Privilege Escalation
                      Tasks

                      static1

                      behavioral1

                      10/10

                      behavioral2

                      10/10