General

  • Target

    94b791ca9e928c7c8b03d1690221f50bd111425b76e7043a4a4a9232a6501415

  • Size

    350KB

  • Sample

    220521-phwktafdb7

  • MD5

    8c31f5941495a1e7a725ea0880110c48

  • SHA1

    291bebee8bc8f1bd024287b7f3aec37672d8ff53

  • SHA256

    94b791ca9e928c7c8b03d1690221f50bd111425b76e7043a4a4a9232a6501415

  • SHA512

    d63a7192123c211afeccf6aa15b6d263e407b85b044baf0e5337616467f68ca70d811d6ec08faf6979af178d6fcd6b78cef14ac09d4c8d816f74043eb6b7ebfd

Malware Config

Extracted

Family

remcos

Version

2.5.0 Pro

Botnet

RemoteHost

C2

ifeanyiogbunebe.ddns.net:1965

Attributes
  • audio_folder

    MicRecords

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    Remcos-30G8UD

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

  • take_screenshot_title

    wikipedia;solitaire;

Targets

    • Target

      Offer Request 6100003768,pdf.exe

    • Size

      289KB

    • MD5

      b41cc5d5d29433eba84d43adae2f53aa

    • SHA1

      985bd980736009c65be2b0307a18abe01cdcd6ab

    • SHA256

      313a41fbc3104d06f0930f422d0ac01d6113cbe01be85c9024873ee7f0214b02

    • SHA512

      a12b232bfa41c4e2d9b9d64cdac37642fd33ec619eed65a270b2333fd31b81bd133095ef33a4069518f58263d7e0947a399898cd2b6b6b951e82b824349e4d6b

    • CoreEntity .NET Packer

      A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • ReZer0 packer

      Detects ReZer0, a packer with multiple versions used in various campaigns.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Scripting

1
T1064

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks