General

  • Target

    SecuriteInfo.com.Win32.PWSX-gen.18196.4017.exe

  • Size

    1.4MB

  • Sample

    221205-jcy6vsha34

  • MD5

    fecaf29f4b5fa02b801f7dcaf13472d8

  • SHA1

    ed394790fbd6c2adb6db9f4dc44d54dd85cc4171

  • SHA256

    f19755963c94dc74b9f91b947ed0e54f7045d07d1acaa94faab62cdcb8f3cd27

  • SHA512

    993cc7f3055adf6e9ced61b4b4a1beb0f97a81e69dee6ba676229716d97a25ba63c3458485b618cdee4df8997d3e7828b98371494cbf0627d6f0ae8244f4032e

  • SSDEEP

    24576:Kg7AqlKSw+m74B/WHoUdSs/B1pfk4Nor1JbamMdGT8i:F7AxJ74BfUkQB1Vkxl0dS8

Malware Config

Extracted

Family

remcos

Botnet

UC

C2

ucremcz1.ddns.net:1823

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    BIN.exe

  • copy_folder

    BIN

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    true

  • install_path

    %AppData%

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    Rmc-TYHMFA

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    bin

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      SecuriteInfo.com.Win32.PWSX-gen.18196.4017.exe

    • Size

      1.4MB

    • MD5

      fecaf29f4b5fa02b801f7dcaf13472d8

    • SHA1

      ed394790fbd6c2adb6db9f4dc44d54dd85cc4171

    • SHA256

      f19755963c94dc74b9f91b947ed0e54f7045d07d1acaa94faab62cdcb8f3cd27

    • SHA512

      993cc7f3055adf6e9ced61b4b4a1beb0f97a81e69dee6ba676229716d97a25ba63c3458485b618cdee4df8997d3e7828b98371494cbf0627d6f0ae8244f4032e

    • SSDEEP

      24576:Kg7AqlKSw+m74B/WHoUdSs/B1pfk4Nor1JbamMdGT8i:F7AxJ74BfUkQB1Vkxl0dS8

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks