General

  • Target

    2fae5c7782b7c0cf7e205c1cf79400ef3c88c261b51882fb7f5dadab37013cf9

  • Size

    523KB

  • Sample

    211203-x8ap2ahcck

  • MD5

    6f78f5cf377470fc449263eaf2231dac

  • SHA1

    067211e73b880a6a7c9c01ac2c309ea49579ad1f

  • SHA256

    2fae5c7782b7c0cf7e205c1cf79400ef3c88c261b51882fb7f5dadab37013cf9

  • SHA512

    cc4c07d4b7072391e8c3d182f6a0f85f6994a40b0e0f4d8d2158cd9c6f112e58e2f45f3fff3205c9e7c2e18940f24f713e558aa608683fb897346953d05e758c

Malware Config

Extracted

Family

remcos

Version

3.3.2 Pro

Botnet

J3J3-US

C2

kent0mushinec0n3t.casacam.net:32095

Attributes
  • audio_folder

    MicRecords

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    Pin.exe

  • copy_folder

    J3J3-US

  • delete_file

    true

  • hide_file

    true

  • hide_keylog_file

    true

  • install_flag

    true

  • install_path

    %AppData%

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    J3J3-US

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    Remcos-TFIQE4

  • screenshot_crypt

    true

  • screenshot_flag

    true

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    J3J3-US

  • take_screenshot_option

    false

  • take_screenshot_time

    5

  • take_screenshot_title

    notepad;solitaire;

Targets

    • Target

      2fae5c7782b7c0cf7e205c1cf79400ef3c88c261b51882fb7f5dadab37013cf9

    • Size

      523KB

    • MD5

      6f78f5cf377470fc449263eaf2231dac

    • SHA1

      067211e73b880a6a7c9c01ac2c309ea49579ad1f

    • SHA256

      2fae5c7782b7c0cf7e205c1cf79400ef3c88c261b51882fb7f5dadab37013cf9

    • SHA512

      cc4c07d4b7072391e8c3d182f6a0f85f6994a40b0e0f4d8d2158cd9c6f112e58e2f45f3fff3205c9e7c2e18940f24f713e558aa608683fb897346953d05e758c

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Executes dropped EXE

    • Deletes itself

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks