General

  • Target

    718851e3f679d37e670918ffd078961a.bin

  • Size

    1.1MB

  • Sample

    230323-bs29fsee91

  • MD5

    977bb7812226f04c46b9b5d6f67eb439

  • SHA1

    8d597977f70d546328bb0ed110ceac38aff6467a

  • SHA256

    fc4febc224b3f9bc730fe1a4793d405df10467e1bcea908c5eb5837a3bd1e97c

  • SHA512

    f59131c42af8a68d2f4306d3e4afb63a8e35be9a1a90758628610174aeb3eefa98b6515b472d45f2fb0b60acac22e3112a9b60478d3980a62fe601d617e9f267

  • SSDEEP

    24576:hKr7TxnYqLQm/cP5xC/J+ix1EcdVEsCPZZRbiOMGi0JCR:hSx/F/JYcdV4ZBbMV0Q

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

79.134.225.23:1097

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    true

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-UY1HFR

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      52062e748f2857bf6bc3161cdfade85ec042d45093673514ca1787f7216a70f3.exe

    • Size

      1.2MB

    • MD5

      718851e3f679d37e670918ffd078961a

    • SHA1

      9c10c66b026582d97290c470b551d262e86d42a3

    • SHA256

      52062e748f2857bf6bc3161cdfade85ec042d45093673514ca1787f7216a70f3

    • SHA512

      f47bb5b1955b0dc1d7e161a1a0b82cdefa909fc10f55346f468333867e4bce35e669e33b1a716abc9b10dd8b012f952b79677ec7049234f845693310f17f06b0

    • SSDEEP

      24576:r1QV+zUQjIdnYfnj349Nt+krzbholb28DMx//CN/k3BRfBZ+:rmszUB4nb63n+lb/DynCN/k3BlB

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks