General

  • Target

    Document.exe

  • Size

    626KB

  • Sample

    220805-s3cj8acafq

  • MD5

    df7d93db1a1c0fcaac675dcc9542c6e8

  • SHA1

    c457b5d87971821454278e9979115e213976d261

  • SHA256

    391c0c9765b0c6e269653d011db7a76f57628e08068a4e30943df0219ae9aca5

  • SHA512

    4cc79597e3213d18147165ea9b25b81c070d9fde81689a4790627a7bf13c3864ba3bbec42080bafab33934d80066a0634ce0e10c57a2046a2701905cdd71b411

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

hendersonk1.hopto.org:2404

henderson1.camdvr.org:2404

centplus1.serveftp.com:2404

harrywlike.ddns.net:2404

genekol.nsupdate.info:2404

harrywlike1.ddns.net:2404

hendersonk2022.hopto.org:2404

genekol1.nsupdate.info:2404

generem.camdvr.org:2404

Attributes
audio_folder
MicRecords
audio_path
%AppData%
audio_record_time
5
connect_delay
0
connect_interval
1
copy_file
remcos.exe
copy_folder
Remcos
delete_file
false
hide_file
false
hide_keylog_file
false
install_flag
false
install_path
%AppData%
keylog_crypt
false
keylog_file
logs.dat
keylog_flag
false
keylog_folder
remcos
keylog_path
%AppData%
mouse_option
false
mutex
gsgjdwg-F1R0WU
screenshot_crypt
false
screenshot_flag
false
screenshot_folder
Screenshots
screenshot_path
%AppData%
screenshot_time
10
startup_value
Remcos
take_screenshot_option
false
take_screenshot_time
5
take_screenshot_title
notepad;solitaire;

Targets

    • Target

      Document.exe

    • Size

      626KB

    • MD5

      df7d93db1a1c0fcaac675dcc9542c6e8

    • SHA1

      c457b5d87971821454278e9979115e213976d261

    • SHA256

      391c0c9765b0c6e269653d011db7a76f57628e08068a4e30943df0219ae9aca5

    • SHA512

      4cc79597e3213d18147165ea9b25b81c070d9fde81689a4790627a7bf13c3864ba3bbec42080bafab33934d80066a0634ce0e10c57a2046a2701905cdd71b411

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Blocklisted process makes network request

    • Adds Run key to start application

MITRE ATT&CK Matrix

Collection

    Command and Control

      Credential Access

        Execution

          Exfiltration

            Impact

              Initial Access

                Lateral Movement

                  Privilege Escalation