General

  • Target

    SecuriteInfo.com.Trojan7000000f1.31576.17282

  • Size

    859KB

  • Sample

    220808-yhhtdshcg2

  • MD5

    b25559abb9260a598d98bf66b7725784

  • SHA1

    8dade95ddbd3c29d8d6e5e47ee4c8eb0bbac0e65

  • SHA256

    21d5d5d31a4a17556ceb223272f3e908a352485dcd90dc203c99826638e7cbd9

  • SHA512

    216f94b2232d13d211f07d4bbf7a3c1cb7093e1a45d176374c567d690fd467705b2caa4e5763f62d2b07afc0189a46e45e882c490d29c05aff8eb713e0d1ca91

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

hendersonk1.hopto.org:2404

henderson1.camdvr.org:2404

centplus1.serveftp.com:2404

harrywlike.ddns.net:2404

genekol.nsupdate.info:2404

harrywlike1.ddns.net:2404

hendersonk2022.hopto.org:2404

genekol1.nsupdate.info:2404

generem.camdvr.org:2404

Attributes
audio_folder
MicRecords
audio_path
%AppData%
audio_record_time
5
connect_delay
0
connect_interval
1
copy_file
remcos.exe
copy_folder
Remcos
delete_file
false
hide_file
false
hide_keylog_file
false
install_flag
false
install_path
%AppData%
keylog_crypt
false
keylog_file
logs.dat
keylog_flag
false
keylog_folder
remcos
keylog_path
%AppData%
mouse_option
false
mutex
gsgjdwg-DIO8L7
screenshot_crypt
false
screenshot_flag
false
screenshot_folder
Screenshots
screenshot_path
%AppData%
screenshot_time
10
startup_value
Remcos
take_screenshot_option
false
take_screenshot_time
5
take_screenshot_title
notepad;solitaire;

Targets

    • Target

      SecuriteInfo.com.Trojan7000000f1.31576.17282

    • Size

      859KB

    • MD5

      b25559abb9260a598d98bf66b7725784

    • SHA1

      8dade95ddbd3c29d8d6e5e47ee4c8eb0bbac0e65

    • SHA256

      21d5d5d31a4a17556ceb223272f3e908a352485dcd90dc203c99826638e7cbd9

    • SHA512

      216f94b2232d13d211f07d4bbf7a3c1cb7093e1a45d176374c567d690fd467705b2caa4e5763f62d2b07afc0189a46e45e882c490d29c05aff8eb713e0d1ca91

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

MITRE ATT&CK Matrix

Collection

    Command and Control

      Credential Access

        Defense Evasion

        Execution

          Exfiltration

            Impact

              Initial Access

                Lateral Movement

                  Privilege Escalation