General

  • Target

    7adaa2ece539a6b3a01060e92ad910a7e8983e6325d72dadb257d7085f28ce81

  • Size

    139KB

  • Sample

    220521-pwdbdsbcfn

  • MD5

    c15718ee640686215d871212f87efcbb

  • SHA1

    d7584d324eac7693090f06d07cf8708b9d5e6eff

  • SHA256

    7adaa2ece539a6b3a01060e92ad910a7e8983e6325d72dadb257d7085f28ce81

  • SHA512

    db9729de56695d0f123dfeaeb33d5db264228be96196adc97d61ef54a385b2fd64a1337ae67fb2dc4744f702ec867adc9d28ef3059ddfd77f7ee103c347a8864

Score
10/10

Malware Config

Extracted

Family

remcos

Version

2.5.1 Pro

Botnet

Amazone

C2

79.134.225.43:5908

Attributes
  • audio_folder

    MicRecords

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    -JSKOGA

  • screenshot_crypt

    false

  • screenshot_flag

    true

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

  • take_screenshot_title

    wikipedia;solitaire;

Targets

    • Target

      ORDEZTECH202067.exe

    • Size

      729KB

    • MD5

      5e03e07d2701ae88f1d072d7c1102762

    • SHA1

      8c50f5333bfe34d846de0df1782386c0ffcf0667

    • SHA256

      4ad47d37f0033d71887d69f3dfdb0961c10e98d7db1928beab71d6540db95c03

    • SHA512

      754d1df02ff15072f182956491b97eb45e11c835555d67279176fafe15026ee3a1fc9dfae33e4fa12860d84ca6f88032d9e54a9e1d70f5be160895005db627b7

    Score
    10/10
    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks