General

  • Target

    NEAS.NEAS015de283d33b7b246204fad78eaede87ab7939aaa34f035d59569aec3606747dexeexe_JC.exe

  • Size

    909KB

  • Sample

    231021-wmge1sgc8w

  • MD5

    1471855e22fc3165fffc6e371bc01feb

  • SHA1

    acd40870c767d6a4590b0ba5abe8cffad7651de5

  • SHA256

    015de283d33b7b246204fad78eaede87ab7939aaa34f035d59569aec3606747d

  • SHA512

    419f8b0cc930569d92bc7eb8150bb6d6503d290ade994f04ca2b24dbeec3cf13d0bf506fe123e7b03dd933cbb85864ba93a1535982e8fdbbe2edc8f00c467973

  • SSDEEP

    12288:OyQaMFM0Mvxv9pb4wWCr5RUggLg3pZgPBARN3qQ:Oyjv9Mwd7bcO4

Malware Config

Extracted

Family

remcos

Version

1.7 Pro

Botnet

Independence

C2

ascoitaliasasummer.duckdns.org:3030

Attributes
  • audio_folder

    audio

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    5

  • copy_file

    Windows Sessions Start.exe

  • copy_folder

    Microsoft Media Session

  • delete_file

    false

  • hide_file

    true

  • hide_keylog_file

    true

  • install_flag

    true

  • install_path

    %WinDir%

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    Windows Display

  • keylog_path

    %WinDir%

  • mouse_option

    false

  • mutex

    Windows Audio

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screens

  • screenshot_path

    %AppData%

  • screenshot_time

    1

  • startup_value

    Windows Sounds EndPoints

  • take_screenshot_option

    true

  • take_screenshot_time

    5

  • take_screenshot_title

    Username;password;proforma;invoice;notepad

Targets

    • Target

      NEAS.NEAS015de283d33b7b246204fad78eaede87ab7939aaa34f035d59569aec3606747dexeexe_JC.exe

    • Size

      909KB

    • MD5

      1471855e22fc3165fffc6e371bc01feb

    • SHA1

      acd40870c767d6a4590b0ba5abe8cffad7651de5

    • SHA256

      015de283d33b7b246204fad78eaede87ab7939aaa34f035d59569aec3606747d

    • SHA512

      419f8b0cc930569d92bc7eb8150bb6d6503d290ade994f04ca2b24dbeec3cf13d0bf506fe123e7b03dd933cbb85864ba93a1535982e8fdbbe2edc8f00c467973

    • SSDEEP

      12288:OyQaMFM0Mvxv9pb4wWCr5RUggLg3pZgPBARN3qQ:Oyjv9Mwd7bcO4

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Detected potential entity reuse from brand microsoft.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks