General

  • Target

    a98a545874c06efde00c0c2a54c4e503.exe

  • Size

    1.3MB

  • Sample

    230519-tlsesahd4v

  • MD5

    a98a545874c06efde00c0c2a54c4e503

  • SHA1

    a35e935da33a72622e6da3507a1cab3e6aea3347

  • SHA256

    90f752930ccd1f6ae8292480b705f65f0ef2e70407b3db489651822ea1349f9f

  • SHA512

    bc6b7c9007d16ae46d8d6a8508325d43b9f2a1c3c40df5424427a2207f6618f0b27d86eaef5b5571c70360d7d3891903d9b734c3774ff3ca28ed84715854cb50

  • SSDEEP

    24576:BSCeIM5/f84n0Gz39WPLZuMRau+5IrtXOplftVBUlK15jDLbO7eyV:zvMFf84r9EoMfk0OjfDL67eI

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

top.noneabuse01.xyz:2070

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-3J1W3R

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      a98a545874c06efde00c0c2a54c4e503.exe

    • Size

      1.3MB

    • MD5

      a98a545874c06efde00c0c2a54c4e503

    • SHA1

      a35e935da33a72622e6da3507a1cab3e6aea3347

    • SHA256

      90f752930ccd1f6ae8292480b705f65f0ef2e70407b3db489651822ea1349f9f

    • SHA512

      bc6b7c9007d16ae46d8d6a8508325d43b9f2a1c3c40df5424427a2207f6618f0b27d86eaef5b5571c70360d7d3891903d9b734c3774ff3ca28ed84715854cb50

    • SSDEEP

      24576:BSCeIM5/f84n0Gz39WPLZuMRau+5IrtXOplftVBUlK15jDLbO7eyV:zvMFf84r9EoMfk0OjfDL67eI

    • Modifies WinLogon for persistence

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.