General

  • Target

    Payment Remittance.xls

  • Size

    79KB

  • Sample

    220818-hrpqasdhc9

  • MD5

    e12d4ea1d922a7bf268e0133163a92f6

  • SHA1

    b02e8013f9695756d9fab1a5b677bbb39b3e48d7

  • SHA256

    0ef76ce10558c86b6d359cd9da83a8fe3ba2dc2f36267447f4e191aaa4aa3125

  • SHA512

    c9eb96bf6445fd3f3336bf2649caf6e511ae831e95e580e7b8663288e623fa89660afa5f04334d6877b91e3924b8cf567f55514310224698c89e49e090e965a7

  • SSDEEP

    1536:4k3hOdsylKlgxopeiBNhZFGzE+cL2kdAw+ungFnoN46yVuKPWSiOpJ82pPA:4k3hOdsylKlgxopeiBNhZFGzE+cL2kdQ

Malware Config

Extracted

Family

remcos

Botnet

AUGB22

C2

saptransmissions.dvrlists.com:55026

Attributes
  • audio_folder

    MicRecords

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    AUGB22

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    AUGB22-35AN4B

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

  • take_screenshot_title

    wikipedia;solitaire;

Targets

    • Target

      Payment Remittance.xls

    • Size

      79KB

    • MD5

      e12d4ea1d922a7bf268e0133163a92f6

    • SHA1

      b02e8013f9695756d9fab1a5b677bbb39b3e48d7

    • SHA256

      0ef76ce10558c86b6d359cd9da83a8fe3ba2dc2f36267447f4e191aaa4aa3125

    • SHA512

      c9eb96bf6445fd3f3336bf2649caf6e511ae831e95e580e7b8663288e623fa89660afa5f04334d6877b91e3924b8cf567f55514310224698c89e49e090e965a7

    • SSDEEP

      1536:4k3hOdsylKlgxopeiBNhZFGzE+cL2kdAw+ungFnoN46yVuKPWSiOpJ82pPA:4k3hOdsylKlgxopeiBNhZFGzE+cL2kdQ

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks