General

  • Target

    XLA.exe

  • Size

    936KB

  • Sample

    221028-qwsxhsffe9

  • MD5

    c44491911d5cfcc1dc31ac019c2714aa

  • SHA1

    635e1be851baee85fb17cb2781bc6d9ee6a94f8b

  • SHA256

    4fb5476bfc11cb3da1feffa767cc7abb70040bd0b11c0e26a7e4d2bdc2d5e049

  • SHA512

    e4649b1878060833939f6762df5a95275f4b5c4b7108eab2100140a2a5fbd39374d8f9e177a9182423c74d246808e68228f6dd6b6cf109894a255f8ce4505c15

  • SSDEEP

    12288:/44mF6XP6Cau9Jez6Qf2ItKcTvNwjc5ul/1hfeq85A1DisBCos5yrO6okfY+uEjQ:/Ba6fsWlawcWrZYoZfBBj

Malware Config

Extracted

Family

remcos

Botnet

XP

C2

xpremcuz300622.ddns.net:3542

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    oos.exe

  • delete_file

    false

  • hide_file

    true

  • hide_keylog_file

    false

  • install_flag

    true

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Remcos-MMP2I7

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    kkl

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      XLA.exe

    • Size

      936KB

    • MD5

      c44491911d5cfcc1dc31ac019c2714aa

    • SHA1

      635e1be851baee85fb17cb2781bc6d9ee6a94f8b

    • SHA256

      4fb5476bfc11cb3da1feffa767cc7abb70040bd0b11c0e26a7e4d2bdc2d5e049

    • SHA512

      e4649b1878060833939f6762df5a95275f4b5c4b7108eab2100140a2a5fbd39374d8f9e177a9182423c74d246808e68228f6dd6b6cf109894a255f8ce4505c15

    • SSDEEP

      12288:/44mF6XP6Cau9Jez6Qf2ItKcTvNwjc5ul/1hfeq85A1DisBCos5yrO6okfY+uEjQ:/Ba6fsWlawcWrZYoZfBBj

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks