General

  • Target

    purchase order PO# - 574FT784.pdf .exe

  • Size

    660KB

  • Sample

    230214-kc1v5aca27

  • MD5

    2c14dbbf5602f2d0677fd14688510f98

  • SHA1

    9a1662a83bc581c86a7578c19d6b060eb1ae0de8

  • SHA256

    46cf54527bf4f361ec7b9d9d8f3867297057eb1048fcc27c7532393748d0d45b

  • SHA512

    b7b0306d138a606637e6686edaea8cc11bb3009b40e71eacd412c9e5e6faab33c68d212c4da2bff3b95594e30d54945c53d2fb51917ae086d1a6589ff2434d11

  • SSDEEP

    12288:oYcDqxb52aKtOxSOj+IOvFMGdGe4vURvAvb37Wggj3F0gpasyKL2My:oYKm5BsRdNMgL4Pj3ou9Sy

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost KOKO

C2

149.202.24.70:1960

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-5V0WG9

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      purchase order PO# - 574FT784.pdf .exe

    • Size

      660KB

    • MD5

      2c14dbbf5602f2d0677fd14688510f98

    • SHA1

      9a1662a83bc581c86a7578c19d6b060eb1ae0de8

    • SHA256

      46cf54527bf4f361ec7b9d9d8f3867297057eb1048fcc27c7532393748d0d45b

    • SHA512

      b7b0306d138a606637e6686edaea8cc11bb3009b40e71eacd412c9e5e6faab33c68d212c4da2bff3b95594e30d54945c53d2fb51917ae086d1a6589ff2434d11

    • SSDEEP

      12288:oYcDqxb52aKtOxSOj+IOvFMGdGe4vURvAvb37Wggj3F0gpasyKL2My:oYKm5BsRdNMgL4Pj3ou9Sy

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks