General

  • Target

    SecuriteInfo.com.W32.AIDetect.malware2.6319.3121

  • Size

    876KB

  • Sample

    220807-kmze2sahg9

  • MD5

    224a5532ebd723ef2ef09c3aa8262642

  • SHA1

    d822c066fc10f00dbb3f19a0067d514936d6e523

  • SHA256

    b7aacc2b12e6e8f89a954e2623b6a53137257e4039ecc45311998caf6cd41cf0

  • SHA512

    f0be7c9ca4fb82318f66e3ced2993fbdd47fd6281dd5f64dc5bbb9733359800a2d538b51095969243c386c4efd47b9df42191cfc379cd15f5f7d60de95a029fa

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

dash.3utilities.com:2404

dash1.3utilities.com:2404

dash2.ddns.net:2404

bash.mywire.org:2404

bash1.accesscam.org:2404

dash3.ddns.net:2404

dash4.ddns.net:2404

bash2.accessscam.org:2404

Attributes
audio_folder
MicRecords
audio_path
%AppData%
audio_record_time
5
connect_delay
0
connect_interval
1
copy_file
remcos.exe
copy_folder
Remcos
delete_file
false
hide_file
false
hide_keylog_file
false
install_flag
false
install_path
%AppData%
keylog_crypt
false
keylog_file
logs.dat
keylog_flag
false
keylog_folder
remcos
keylog_path
%AppData%
mouse_option
false
mutex
dashboard-AHIVSC
screenshot_crypt
false
screenshot_flag
false
screenshot_folder
Screenshots
screenshot_path
%AppData%
screenshot_time
10
startup_value
Remcos
take_screenshot_option
false
take_screenshot_time
5
take_screenshot_title
notepad;solitaire;

Targets

    • Target

      SecuriteInfo.com.W32.AIDetect.malware2.6319.3121

    • Size

      876KB

    • MD5

      224a5532ebd723ef2ef09c3aa8262642

    • SHA1

      d822c066fc10f00dbb3f19a0067d514936d6e523

    • SHA256

      b7aacc2b12e6e8f89a954e2623b6a53137257e4039ecc45311998caf6cd41cf0

    • SHA512

      f0be7c9ca4fb82318f66e3ced2993fbdd47fd6281dd5f64dc5bbb9733359800a2d538b51095969243c386c4efd47b9df42191cfc379cd15f5f7d60de95a029fa

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

MITRE ATT&CK Matrix

Collection

    Command and Control

      Credential Access

        Defense Evasion

        Execution

          Exfiltration

            Impact

              Initial Access

                Lateral Movement

                  Privilege Escalation