General

  • Target

    6049640259158016.zip

  • Size

    364KB

  • Sample

    220203-p5t1haheaq

  • MD5

    4459b922fb2eaf36c316bbca0c185952

  • SHA1

    f2b96751bc02c5793267c7f602b490f349a0908f

  • SHA256

    4c8c59242b2c2a8b0873d6c06ce57ba6b31dd1e92859f0a444ac3f14d47d275b

  • SHA512

    6daf23e5dea5640fe7aaf5c708ff1d11171861daf1169743e36bae6cca20779ad58682132a67eed3d6a9e1c159d9dd28d83c320156475c5ca0377e5050f0c708

Malware Config

Extracted

Family

remcos

Version

2.7.0 Pro

Botnet

14

C2

prueba6812111.duckdns.org:1717

Attributes
  • audio_folder

    MicRecords

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    Remcos-HEOTZ9

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

  • take_screenshot_title

    wikipedia;solitaire;

Targets

    • Target

      81dcd7fc775c85bd470186ae6204fe8c1bb126e0aa23b9740b81f5b733d229d1

    • Size

      502KB

    • MD5

      d44ba5b8a9598cb8ce4d82f0b5e48d9f

    • SHA1

      755308b8328eafa8f9b78e63e1e699717da7d718

    • SHA256

      81dcd7fc775c85bd470186ae6204fe8c1bb126e0aa23b9740b81f5b733d229d1

    • SHA512

      f7eff85ce186faef8e6bfad30d2668d831cc09b70f0c269a2f17432a56cf89c67c93d3cd9c203928b74824aa44d2c2bcdd63831f3deba83c663a58616a57449f

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Tasks