General

  • Target

    60793dd7cdaf080ab5ba21a3c1294e32.zip

  • Size

    1.6MB

  • Sample

    230330-3akegafg94

  • MD5

    f278d2a794b8204ee8f46b3fb5838fff

  • SHA1

    c2a7065e179ba6ae5a8fde4e0ecf5c724ccd128a

  • SHA256

    95ede7a41b3ab0fb0b9d71d30eb506ae0c37354fd48772b0bcdc59ff7deea692

  • SHA512

    03559e3fec1bea890db88af5968b59e68f66ce5617be6a6dd6c7347a9fe6380e7c9694373fa22f1a564301c09c29e6d6703763e13bf7270e6ae37dd1500e0a6b

  • SSDEEP

    12288:q/tOGOw13IIV0rgUmDACCZ3BqFwd/aDPvaERtYa:qAGjtJJUaMZ3BZla

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

BILLETE

C2

cactus.con-ip.com:7770

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-9927QM

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      60793dd7cdaf080ab5ba21a3c1294e32

    • Size

      1024.0MB

    • MD5

      932f4060cc31b4dbaffa1bb6d3991c20

    • SHA1

      989f4fb91c3a30a0789c0d61c1b8c5dad659747e

    • SHA256

      a40084ddc1d6655c2f78365a9ef6a9b81997cfa98a6f81c8d7dfe9619ef6b853

    • SHA512

      7bb952847d5bacff9275415ba02a6fbeb180d16b2ef23591a60f9fe302f51301d7c967af5eaa5dc9135ceb108cdf25afdf745a3875b5b0655924452d1f753ba5

    • SSDEEP

      6144:AxjCbYJafbpsBSM/HVFku/7AGLr5lw2H3SgoXraFjvVpQ+QW8uR3OoJWwvTTZlIY:+PozpsBzkuHPgDsvELuv7ZlIgCjIDF

    Score
    10/10
    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks