General

  • Target

    fff14d27cfcfd3a46729a41bd6dcbb09e667f894e2c85b4e7eb5098faccfa6ab

  • Size

    522KB

  • Sample

    221123-xgmwaahh81

  • MD5

    b72ae9d7baf90a64c20cb156d41cf990

  • SHA1

    e5610323c01f85900f6749bfd3731457ef6cfc4c

  • SHA256

    c8342771661114dd50790c42ef80c713a702dc267d6b3697419f74b2207bf99d

  • SHA512

    febdd13883c71d9c23d8fad3de3bc3f7690c6e90b4771bb779eac5eca6f0021d2af2cfd33f2d4b249dc6df211706cda52904881fd6563c7f9c05f95a6e18d8bd

  • SSDEEP

    12288:s76E0+DRe9Zj371Mb7CZhfETLrLyvVJ5NQVhm5uhaD0FJk:s7X0+tu5371D/cPLyvV7Pu+0FJk

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

51.75.209.245:2404

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-CMFPLR

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      fff14d27cfcfd3a46729a41bd6dcbb09e667f894e2c85b4e7eb5098faccfa6ab

    • Size

      591KB

    • MD5

      ab6ebb46942e94eb3661c4c86b099e8b

    • SHA1

      f54817be0255ff370d2f9272b6593d9aacf1b6b8

    • SHA256

      fff14d27cfcfd3a46729a41bd6dcbb09e667f894e2c85b4e7eb5098faccfa6ab

    • SHA512

      0c548efa026dd3d49b1cbe894ce1f2e75df4f965558e89677ef7199f67d019d4a1bb4ac7624cd1b307515018196b380205bd7aff7e57a2aeffa4418dd101c731

    • SSDEEP

      12288:qHvJn9wxkMn3Y7LnrjQx5PZ4BL2WwcULxjW3Vst0KCi/pB7o:qhn6ksY7jrsx5+MxjWs0KNB

    Score
    10/10
    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks