General

  • Target

    17b4d4ca21f00476cc685afc5d3e50c05dee6cb254bed429993ee57750abf6be.zip

  • Size

    731KB

  • Sample

    230321-r4peqsde4t

  • MD5

    c4b7e519283adeacccd58aef1123aaee

  • SHA1

    7aedf5bcc4cf8d53ca563b8ef45e861f4bffe81b

  • SHA256

    cf88f2729ca4bdcad4c33dde11bba72edb4fc0cc5eed18d2d0a762364b2a1404

  • SHA512

    d430b6c43a96f57d312cdcdde3b61ee4447a71cedcbf9e51bfd56c1c2f8aa5a51ce3a51907f215f46abccdf081e3fbdbe89063d4648e4c1198e880db673ec0fc

  • SSDEEP

    12288:PIo9m2bju0GGYiahrGXQ/KIk1QWpAcscVgF6mj6nG9MMD15m01za1h:Akj59Xy8Pc2mj6G9MMu01zaf

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

51.75.209.245:2406

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-52YOYG

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      Product Catalogue.exe

    • Size

      783KB

    • MD5

      6b04befe5957d4a3513447ae0eadbcd3

    • SHA1

      cdb2fa02b24118d0c501a4bf6479a57e9b941c3c

    • SHA256

      4b54075f2a8e292530e7741ed3e2da8f0ba10a3936fe3642e651e7d6fbb10921

    • SHA512

      8754b20c2a1a762b3a945fd4c6035380ac38bb03ea5541a0dcdc2d011746ec5d37323693b0df2649aa5df91315f7f8764b0215155205c666876200c58df50b1c

    • SSDEEP

      24576:4PSxu2EYvZOwbfeT/FmkSYTU5Nb+Ca75Et:h4Yx1rW/F8D6Ca75I

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • UAC bypass

    • Windows security bypass

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Sets service image path in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

2
T1060

Scheduled Task

1
T1053

Privilege Escalation

Bypass User Account Control

1
T1088

Scheduled Task

1
T1053

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

3
T1089

Modify Registry

6
T1112

Virtualization/Sandbox Evasion

2
T1497

Scripting

1
T1064

Discovery

Query Registry

6
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

5
T1082

Peripheral Device Discovery

1
T1120

Tasks