General

  • Target

    AtiSupplies RFQ against ENQ NO-P1503010.img

  • Size

    2.4MB

  • Sample

    221124-lgrnpaea94

  • MD5

    a0e2d28e24f63ca1190536b0e7acd1e6

  • SHA1

    52830faa9b9c87c272e6ba8896e0aefc2a61c31f

  • SHA256

    b1e3651ef40eaf11bc8471fa88d0f743d41bbca9d71c65271581076e55dd1899

  • SHA512

    cae619032fe4274f4ea17f876ccc72ed101be7a8b6a6eaa12f3ebb9db0191cda00bb50c24f5a1a821c254608b6ac71105e0d342fa7c74723f6d8b3a847508a7a

  • SSDEEP

    49152:cI0qyQ4xwGa38JIhZrOrJ/DpKzPW5NJV050+aZTzJRAle:+VMI/DaP09FTlae

Malware Config

Extracted

Family

remcos

Botnet

mimi

C2

185.206.225.51:18853

127.0.0.1:18853

10.16.225.165:18853

Attributes
  • audio_folder

    MicRecords

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    Remcos-UVAOQ7

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      ACHUBABALO.exe

    • Size

      2.3MB

    • MD5

      e70b644872ce35311bb5195272075c04

    • SHA1

      dbd7db712fd3eb5f018cbe5bc6d5899f0c0e7024

    • SHA256

      77832184096060c1e05b236138b162b009218c3ba698573c32939fe1456a3c1d

    • SHA512

      0cef88c2a00522e5a56fec62e5096740ffdd864ce1c476ab51b9948633bd456b59f0f8824245e5bc71b75b24e483be3e0f3a4e889f2eb3fa79b394f122d8574c

    • SSDEEP

      49152:qI0qyQ4xwGa38JIhZrOrJ/DpKzPW5NJV050+aZTzJRAle:YVMI/DaP09FTlae

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks