General

  • Target

    teste com install.exe

  • Size

    481KB

  • Sample

    230614-n5kamagf2v

  • MD5

    4086733be2c45405f84c2963c92eedbf

  • SHA1

    b395f3a9dad78daf1e138b97198996130cd33993

  • SHA256

    a0126c53ff1dfa5ffdafee5c3b7616dc59b911a75438e86424cce73cf4ccaac5

  • SHA512

    e69317dec7e0c24e871481bcbfd13b51fc37d68bf07a8c4d9d98d4908de8cb95dca74c929efe704a0a7678f0733aaa4b9c0c0e6b4b790c398a9adc03e688ee45

  • SSDEEP

    12288:RRXxReZj3WZfj/2eSseWFaIe2+f8CL47bs/Zf25DU:Rx7cyF2eSsewS8W47eZO

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost (em ingl�s)

C2

craxsrat.ddns.com.br:2404

Attributes
  • audio_folder

    MicRecords (em inglês)

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    debug

  • delete_file

    false

  • hide_file

    true

  • hide_keylog_file

    false

  • install_flag

    true

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-QFNEEW

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Capturas de tela

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      teste com install.exe

    • Size

      481KB

    • MD5

      4086733be2c45405f84c2963c92eedbf

    • SHA1

      b395f3a9dad78daf1e138b97198996130cd33993

    • SHA256

      a0126c53ff1dfa5ffdafee5c3b7616dc59b911a75438e86424cce73cf4ccaac5

    • SHA512

      e69317dec7e0c24e871481bcbfd13b51fc37d68bf07a8c4d9d98d4908de8cb95dca74c929efe704a0a7678f0733aaa4b9c0c0e6b4b790c398a9adc03e688ee45

    • SSDEEP

      12288:RRXxReZj3WZfj/2eSseWFaIe2+f8CL47bs/Zf25DU:Rx7cyF2eSsewS8W47eZO

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks