General

  • Target

    dfc7f8d0f59dc66f78fffea0b999a2a662057edbc39a836de95884147464f643

  • Size

    371KB

  • Sample

    220520-17m6hshhgl

  • MD5

    95d29a0667bf76a05457b0a26c6ea041

  • SHA1

    01bcd7f5cc97e2ba7e5ff064e83b7155715aa265

  • SHA256

    dfc7f8d0f59dc66f78fffea0b999a2a662057edbc39a836de95884147464f643

  • SHA512

    50ba8addba8f4b6541f3a46186a2e9f741914507ad920f3f6696d7546aad48b3c4ad314d4802ad6cc49e8ccefd136e4b06083cef44aedab8618d893886a33474

Malware Config

Extracted

Family

remcos

Version

2.7.0 Pro

Botnet

xxxtew

C2

194.5.97.70:2404

Attributes
  • audio_folder

    MicRecords

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    xxxtew-J74IDK

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

  • take_screenshot_title

    wikipedia;solitaire;

Targets

    • Target

      Ton-Keep purchase order_pdf.exe

    • Size

      461KB

    • MD5

      eaa3035b2314bfba3c2a110d8a43b5be

    • SHA1

      6953afddd00c760525ea91c376b1d5205164841f

    • SHA256

      67163c34b396f7fc4a1dec14c1a0e598d5ac5786e6c26f11c8b8b16b31b70f4c

    • SHA512

      79e38dc75a67c886463cbd0b924973a409973ad68fe1968c84fe47766854399347aff59b96fb9a099abb802cbb6c5c8ed76eb68b1a9ce753a74cbf2671e90148

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Discovery

Query Registry

5
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Tasks