General

  • Target

    RADICACIÓN No. 009-2023-4052-5622-00.tar

  • Size

    1.5MB

  • Sample

    230414-zwfrmadd5z

  • MD5

    ffd93451dd0d04095978eca4f59726a8

  • SHA1

    a604709693ff2efd3115e390a0fafc7f405e93b9

  • SHA256

    29cf57a93d8b50b45fad01b70f55734b22939cf69c5bce058abdb8714c40ac49

  • SHA512

    0025610ca41fe40054475a1526ab62a1fe2334c660fa4f64a7cb266be9d1b40800c9fca4161a4229b18764fc69191bbacc51a0de0ad06dcc405ca00fa14e5d1b

  • SSDEEP

    24576:PLwyhQ5vKAUJSLd0//5jizBq/pTeW29UFytTKUFWGPh6zN4KubCHPi1kCo5HDi:z6vKfJSMyq4z9U0tTKUUGPEzva1v6ji

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

BENDITO

C2

bandota.con-ip.com:7770

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    registros.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-FIKK5W

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Capturas de pantalla

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      RADICACIÓN No. 009-2023-4052-5622-00..exe

    • Size

      1023.9MB

    • MD5

      07b2cd28b50f11ef50f653287278260e

    • SHA1

      82b382424dbb97f613a9cf0e93184701bd05e5dd

    • SHA256

      94cc338c460474818ab8aec2416aca25a894061891418be5c7a1aa953c39791a

    • SHA512

      3a3ee61929713fb8557123ffe5a7e1924216472ed2991b301ddf30cfee5575159b2599fbf2db69b0d6658d568f9f95ede8fa22c115d3cfba50453c612660d93a

    • SSDEEP

      12288:fi060upSomP1SfECRvfNBTG2yntsQNOjfLEefi/S3FBNLAagCfzdX:fN6bpzmP0X1BTG2AmzGcVAb+5X

    Score
    10/10
    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks