General

  • Target

    Revised_Order_Document‮fdp.zip

  • Size

    1.6MB

  • Sample

    230328-g96absbb6w

  • MD5

    dc000f8d7b1a5d7ac4f41a6ebf47e106

  • SHA1

    1099300f5eb9aaf3a544b4d02b305754ffe1056c

  • SHA256

    e5ce666cd121335782af08f14bbe122ee6cb723f4d4bafd4ec76cf6ed34f3e1a

  • SHA512

    88dff0e9ca56750d693b9ead0db1b890d8a646ca5be43f9ad65c0ae16b2ee4f2d82f75f692b01a83bc3b6bf4676c07ebc925a8d82ca45fd73fdabbd634c70d9a

  • SSDEEP

    49152:dG8VYw7IfiGTZvqUpeT/l5ZC0qJz7YMZgU:dRew7mpyRDnZC0KYMZt

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

185.246.220.63:2404

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-0ILS8U

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      Revised_Order_Document‮fdp.Scr

    • Size

      300.3MB

    • MD5

      03a5de4492a409b3fd4dcadb87f6e140

    • SHA1

      bb280dad0be2f7641bb83ca7429dc1861f90b39a

    • SHA256

      07d8b0e5d6e43ea033dd06335b5b19c179f78733648a79006f9ac20b5c22042e

    • SHA512

      2d8c5e179581e7633285df8e5ebcbe39bfed288b4416899d8941b5b138ae3d16b94fe612ea0a6cd1d2db303117b2881e678ffb2017a312b787935ea082589a59

    • SSDEEP

      24576:ZTbBv5rUmlWpuLPF/q0f6PoedrSO67Lot/uMrD3gi64o:TBqaPdfuokSHOGMrD3364

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Detected potential entity reuse from brand microsoft.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks