General

  • Target

    e769d1ecf91ef14b51509807b816b148a9a087da59714947951f7e06735b5c76

  • Size

    1023KB

  • Sample

    220130-vd2txsfeg5

  • MD5

    d748b7636247f497fa69a9b3dac8a1c6

  • SHA1

    d1e73e0fd37aa7494b4b7ce9d5627666994eb3f1

  • SHA256

    e769d1ecf91ef14b51509807b816b148a9a087da59714947951f7e06735b5c76

  • SHA512

    5384be1c8ea45763c42b43bd46b0a9a48cd22b6f17c8cd111aa69093dc31e69c52e3c30bc810e8d118a52c88fe5daa5998b5fe834f6b7d05f808c5959c230e3b

Malware Config

Extracted

Family

remcos

Version

3.3.2 Light

Botnet

RemoteHost

C2

91.243.44.75:1703

Attributes
  • audio_folder

    MicRecords

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    Remcos-W5VMG1

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

  • take_screenshot_title

    notepad;solitaire;

Targets

    • Target

      e769d1ecf91ef14b51509807b816b148a9a087da59714947951f7e06735b5c76

    • Size

      1023KB

    • MD5

      d748b7636247f497fa69a9b3dac8a1c6

    • SHA1

      d1e73e0fd37aa7494b4b7ce9d5627666994eb3f1

    • SHA256

      e769d1ecf91ef14b51509807b816b148a9a087da59714947951f7e06735b5c76

    • SHA512

      5384be1c8ea45763c42b43bd46b0a9a48cd22b6f17c8cd111aa69093dc31e69c52e3c30bc810e8d118a52c88fe5daa5998b5fe834f6b7d05f808c5959c230e3b

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Remote System Discovery

1
T1018

Tasks