General

  • Target

    Swift copy.exe

  • Size

    551KB

  • Sample

    221207-nwt4gadd73

  • MD5

    9bf8c117b8737c7001b81b63fc13943b

  • SHA1

    f50c1f889bec8791cedb78d29b13acd6a610c4fb

  • SHA256

    f830ced2c0d06737392dddabd93828fa37430b0c6ec27cb7186c46d5e2f570b8

  • SHA512

    286fdb320a344660497353f102f982af6dbdf4092571ef093fb9a073f299b0e1b7a4ad7d5b232cac8bb4751e8c52314bde488fcb17681914dabe240493ac8f8e

  • SSDEEP

    12288:gyI0+stnJ1EDBFyrpXtCvjCw10Uov7uec1hn4Kl0WUX:g30+stvsF0xovjt10Uuc17bUX

Malware Config

Extracted

Family

remcos

Botnet

UC

C2

ucremcz1.ddns.net:1823

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    BIN.exe

  • copy_folder

    BIN

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    Rmc-X402GF

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    bin

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      Swift copy.exe

    • Size

      551KB

    • MD5

      9bf8c117b8737c7001b81b63fc13943b

    • SHA1

      f50c1f889bec8791cedb78d29b13acd6a610c4fb

    • SHA256

      f830ced2c0d06737392dddabd93828fa37430b0c6ec27cb7186c46d5e2f570b8

    • SHA512

      286fdb320a344660497353f102f982af6dbdf4092571ef093fb9a073f299b0e1b7a4ad7d5b232cac8bb4751e8c52314bde488fcb17681914dabe240493ac8f8e

    • SSDEEP

      12288:gyI0+stnJ1EDBFyrpXtCvjCw10Uov7uec1hn4Kl0WUX:g30+stvsF0xovjt10Uuc17bUX

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks