General

  • Target

    a98a545874c06efde00c0c2a54c4e503.exe

  • Size

    1.3MB

  • Sample

    230519-tlsesahd4v

  • MD5

    a98a545874c06efde00c0c2a54c4e503

  • SHA1

    a35e935da33a72622e6da3507a1cab3e6aea3347

  • SHA256

    90f752930ccd1f6ae8292480b705f65f0ef2e70407b3db489651822ea1349f9f

  • SHA512

    bc6b7c9007d16ae46d8d6a8508325d43b9f2a1c3c40df5424427a2207f6618f0b27d86eaef5b5571c70360d7d3891903d9b734c3774ff3ca28ed84715854cb50

  • SSDEEP

    24576:BSCeIM5/f84n0Gz39WPLZuMRau+5IrtXOplftVBUlK15jDLbO7eyV:zvMFf84r9EoMfk0OjfDL67eI

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

top.noneabuse01.xyz:2070

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-3J1W3R

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      a98a545874c06efde00c0c2a54c4e503.exe

    • Size

      1.3MB

    • MD5

      a98a545874c06efde00c0c2a54c4e503

    • SHA1

      a35e935da33a72622e6da3507a1cab3e6aea3347

    • SHA256

      90f752930ccd1f6ae8292480b705f65f0ef2e70407b3db489651822ea1349f9f

    • SHA512

      bc6b7c9007d16ae46d8d6a8508325d43b9f2a1c3c40df5424427a2207f6618f0b27d86eaef5b5571c70360d7d3891903d9b734c3774ff3ca28ed84715854cb50

    • SSDEEP

      24576:BSCeIM5/f84n0Gz39WPLZuMRau+5IrtXOplftVBUlK15jDLbO7eyV:zvMFf84r9EoMfk0OjfDL67eI

    • Modifies WinLogon for persistence

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks