BANKSLIP.exe

General
Target

BANKSLIP.exe

Size

726KB

Sample

211021-q7h7fsadd5

Score
10 /10
MD5

fdd9b67bd04d1768858f095d90d5dc88

SHA1

07c81bd427eecbd130e52351d99432b16bdc8d2e

SHA256

3536f79b815a6d77e371df48abaec315c92ccec6e197e547440fa66629edd640

SHA512

4356e6c1ad77ecb750ce4d720521da2113f69f6dfed113c306a0ef6681512cb356c39ecd1d0917d55990efbb7e8abfb796d48c0a77bb0742c75c480777a2b491

Malware Config

Extracted

Family remcos
Version 3.3.0 Pro
Botnet RemoteHost
C2

172.94.88.26:3033

Attributes
audio_folder
MicRecords
audio_path
%AppData%
audio_record_time
5
connect_delay
0
connect_interval
1
copy_file
remcos.exe
copy_folder
Remcos
delete_file
false
hide_file
false
hide_keylog_file
false
install_flag
false
install_path
%AppData%
keylog_crypt
false
keylog_file
logs.dat
keylog_flag
false
keylog_folder
remcos
keylog_path
%AppData%
mouse_option
false
mutex
Remcos-FFP6U6
screenshot_crypt
false
screenshot_flag
false
screenshot_folder
Screenshots
screenshot_path
%AppData%
screenshot_time
10
startup_value
Remcos
take_screenshot_option
false
take_screenshot_time
5
take_screenshot_title
notepad;solitaire;
Targets
Target

BANKSLIP.exe

MD5

fdd9b67bd04d1768858f095d90d5dc88

Filesize

726KB

Score
10 /10
SHA1

07c81bd427eecbd130e52351d99432b16bdc8d2e

SHA256

3536f79b815a6d77e371df48abaec315c92ccec6e197e547440fa66629edd640

SHA512

4356e6c1ad77ecb750ce4d720521da2113f69f6dfed113c306a0ef6681512cb356c39ecd1d0917d55990efbb7e8abfb796d48c0a77bb0742c75c480777a2b491

Tags

Signatures

  • Remcos

    Description

    Remcos is a closed-source remote control and surveillance software.

    Tags

  • Looks for VirtualBox Guest Additions in registry

    Tags

    TTPs

    Query Registry Virtualization/Sandbox Evasion
  • Looks for VMWare Tools registry key

    Tags

    TTPs

    Query Registry Virtualization/Sandbox Evasion
  • Checks BIOS information in registry

    Description

    BIOS information is often read in order to detect sandboxing environments.

    TTPs

    Query Registry System Information Discovery
  • Maps connected drives based on registry

    Description

    Disk information is often read in order to detect sandboxing environments.

    TTPs

    Query Registry Peripheral Device Discovery System Information Discovery
  • Suspicious use of SetThreadContext

Related Tasks

MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Execution
          Exfiltration
            Impact
              Initial Access
                Lateral Movement
                  Persistence
                    Privilege Escalation
                      Tasks

                      static1

                      behavioral1

                      10/10

                      behavioral2

                      10/10