General

  • Target

    6a9957dd2a19a1bf4af05ca7be1694de.exe

  • Size

    268KB

  • Sample

    231204-f9z8mshc2y

  • MD5

    6a9957dd2a19a1bf4af05ca7be1694de

  • SHA1

    72c945a8acf762df42d5d5ae1a281a2e5c3d9196

  • SHA256

    17d18a7a41119c12455a644fefca70b4504db83e0122d6dc2652f46f98de8992

  • SHA512

    42076c0d76914a89e2785eddef8d5049ab8fd958cc363279e0fbb18b819684157d212c2f922502fa6a7e10471eda806b257e37b4712f389cb56eac94c69d5113

  • SSDEEP

    6144:7sGckEKnZ9WIUwBjbXB2PwpD1l0FxFAZAO4adb/oN:AGcbKnZkIUwBjV2PwpRzu6oN

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

185.157.162.241:1303

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    true

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-NT0JNG

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      6a9957dd2a19a1bf4af05ca7be1694de.exe

    • Size

      268KB

    • MD5

      6a9957dd2a19a1bf4af05ca7be1694de

    • SHA1

      72c945a8acf762df42d5d5ae1a281a2e5c3d9196

    • SHA256

      17d18a7a41119c12455a644fefca70b4504db83e0122d6dc2652f46f98de8992

    • SHA512

      42076c0d76914a89e2785eddef8d5049ab8fd958cc363279e0fbb18b819684157d212c2f922502fa6a7e10471eda806b257e37b4712f389cb56eac94c69d5113

    • SSDEEP

      6144:7sGckEKnZ9WIUwBjbXB2PwpD1l0FxFAZAO4adb/oN:AGcbKnZkIUwBjV2PwpRzu6oN

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks