General

  • Target

    xpKemuNsr6Zc.exe

  • Size

    483KB

  • Sample

    231124-rdtxjace8x

  • MD5

    2fb8c581cf0bb31a95221b308d654e06

  • SHA1

    7415c98c6355db123a7960bc0435a01228df5766

  • SHA256

    5883f823c20dba07b8340163a93128f2b056805c441ad7a7162d139e82c503b6

  • SHA512

    f237b15b43779c0d2a74dff96b8f5df9b6e6577bfdc3a9c2dfd5a2d6829fdffa2ad5f16ecd63afc39255ec5ba09ef6c087cb3b7c7764d5ae0697d20e04f3d67f

  • SSDEEP

    6144:+/7iPrcL3ArwhBq7Kjsn9iHGXg0lwGS9MNNhdFvPxps9gsAOZZuAXec7z7ov:+/uPq3AfK496Gw0lwGXN3pvs/ZuW8v

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost (em ingl�s)

C2

9.tcp.ngrok.io:22201

Attributes
  • audio_folder

    MicRecords (em inglês)

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-FRI70T

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Capturas de tela

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      xpKemuNsr6Zc.exe

    • Size

      483KB

    • MD5

      2fb8c581cf0bb31a95221b308d654e06

    • SHA1

      7415c98c6355db123a7960bc0435a01228df5766

    • SHA256

      5883f823c20dba07b8340163a93128f2b056805c441ad7a7162d139e82c503b6

    • SHA512

      f237b15b43779c0d2a74dff96b8f5df9b6e6577bfdc3a9c2dfd5a2d6829fdffa2ad5f16ecd63afc39255ec5ba09ef6c087cb3b7c7764d5ae0697d20e04f3d67f

    • SSDEEP

      6144:+/7iPrcL3ArwhBq7Kjsn9iHGXg0lwGS9MNNhdFvPxps9gsAOZZuAXec7z7ov:+/uPq3AfK496Gw0lwGXN3pvs/ZuW8v

    Score
    7/10
    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks