General

  • Target

    SOA_0209202_pdf.exe

  • Size

    1.4MB

  • Sample

    230329-lgghqahc61

  • MD5

    fe591810a3e0165d06827d9d492688d5

  • SHA1

    c0f253fae57c006f3be56b098f2785f5d9495d4d

  • SHA256

    1d0a51787f8726c44aa40f88422d01f084c4e533c2f190f4aef1696f9fd600d9

  • SHA512

    264e532b1811e1221e2564b8b2a01a2adc1e5c6a1c494edb3a19ea62ec03a3fb5671a8f5403a7af467ce7a52370f969ae188d5bbea8107f28e0781f56d9ef5d0

  • SSDEEP

    24576:K12zVZ97yv6NYzSXbmzDZqlPuQsGzUlNuTOI7UlN4Y4J8BngTf+TSi:KAR37aFSLmzFqlPuczyPI78mTf+Wi

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

127.0.0.1:56932

45.128.234.54:56932

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-D11KCU

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      SOA_0209202_pdf.exe

    • Size

      1.4MB

    • MD5

      fe591810a3e0165d06827d9d492688d5

    • SHA1

      c0f253fae57c006f3be56b098f2785f5d9495d4d

    • SHA256

      1d0a51787f8726c44aa40f88422d01f084c4e533c2f190f4aef1696f9fd600d9

    • SHA512

      264e532b1811e1221e2564b8b2a01a2adc1e5c6a1c494edb3a19ea62ec03a3fb5671a8f5403a7af467ce7a52370f969ae188d5bbea8107f28e0781f56d9ef5d0

    • SSDEEP

      24576:K12zVZ97yv6NYzSXbmzDZqlPuQsGzUlNuTOI7UlN4Y4J8BngTf+TSi:KAR37aFSLmzFqlPuczyPI78mTf+Wi

    Score
    10/10
    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks