General

  • Target

    17b4d4ca21f00476cc685afc5d3e50c05dee6cb254bed429993ee57750abf6be.zip

  • Size

    731KB

  • Sample

    230321-qq9yvaaf35

  • MD5

    5a75499d92200762ea43d7e2e418ead0

  • SHA1

    c2052ec729f878f5a1ee565b4da6aa8539c95416

  • SHA256

    5c420da74788e3ee3876536eee0d7b93cad456faa7ac61e85cf367356e0fae36

  • SHA512

    7e2c5c6edc8af54dd3efcb6e7e34d5e731acf1c0e4f48cecc09b6ea20aa580f094826ae770df347ad20abbf9022ddd8cd2a9558d42fa6e890bbf57d41fb062d8

  • SSDEEP

    12288:dDHYHulfYI6Bd0gFHzf81ld9nKUoyHvctLXVBCYgTYNDktNb0Y9jp3D98/:dYH0fud08ol7niyktLXCnTYNDktL9j/K

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

51.75.209.245:2406

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-52YOYG

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      Product Catalogue.exe

    • Size

      783KB

    • MD5

      6b04befe5957d4a3513447ae0eadbcd3

    • SHA1

      cdb2fa02b24118d0c501a4bf6479a57e9b941c3c

    • SHA256

      4b54075f2a8e292530e7741ed3e2da8f0ba10a3936fe3642e651e7d6fbb10921

    • SHA512

      8754b20c2a1a762b3a945fd4c6035380ac38bb03ea5541a0dcdc2d011746ec5d37323693b0df2649aa5df91315f7f8764b0215155205c666876200c58df50b1c

    • SSDEEP

      24576:4PSxu2EYvZOwbfeT/FmkSYTU5Nb+Ca75Et:h4Yx1rW/F8D6Ca75I

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • UAC bypass

    • Windows security bypass

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Sets service image path in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks