General

  • Target

    NXP ALTERHA CHEM U946-874987.ace

  • Size

    1.0MB

  • Sample

    230329-n8lymagb97

  • MD5

    b66719436517fac5fd503c7aa5b6c508

  • SHA1

    15f4f2305c1df56e39f6787a4206dfa0cfb17375

  • SHA256

    10b7fd0b4c59b3f5584199ef2cbe7b93acfc47300cac47acc9a4ce0dd82701b1

  • SHA512

    414a0753cc80ae7b6280a851933da8acba4e8d54ae9b64cf9a60c5d3cabddd59b385733b83aaedaf38a9624eec6e49899d10fd64bf8b749c3f244b658fc4d1b0

  • SSDEEP

    24576:JKSCjcPUELS24/XFm4EPeWYow4OYOlx5GW6n5JiKr:JL6cPUE2rXFvEkopOY+xA5Jdr

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

212.193.30.230:3330

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    true

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-VPI7TY

  • screenshot_crypt

    false

  • screenshot_flag

    true

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    1

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      NXP ALTERHA CHEM U946-874987.exe

    • Size

      1.3MB

    • MD5

      5d5e76e709b1df312317562127d3d0c0

    • SHA1

      7ea6bbc7ec194f2b38abba2b759574e801a824f9

    • SHA256

      f853dbba694560317f4d0673da02ae77afce25d7eb4dc62f02ed0f5c750ce861

    • SHA512

      b52163cbbd7b48a51ed88668c4f424b95961678c91a9e24026b7967fda12bab710b4a86a5e2e075b30082727f34603e35890305c6bb057df62c71aa28c6f0358

    • SSDEEP

      24576:ce12zVZ97Dc+6yvxly1dJquB9SsFOrOHXLzCIrn0WRO5z:ceAR37P0fkoQbO10u

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks