General

  • Target

    c3a2868d22be2374f1cfc8284d5572350fcd8a69929c3ff476c1323d2eda7139

  • Size

    643KB

  • Sample

    231222-hjtdhsdae7

  • MD5

    3429b093e26a01a614af1a88720e5124

  • SHA1

    a7d2470a01251fd6a6956a51486527b24fc98b45

  • SHA256

    c3a2868d22be2374f1cfc8284d5572350fcd8a69929c3ff476c1323d2eda7139

  • SHA512

    25d74c332b54ece09b091375d7abdf49f33630af80812bfa8b74d4d9724ad6f7d930d0c26e31d1a180aa3476da02ad75788396daad3db9ec646aaf219cba7128

  • SSDEEP

    12288:OATPTDk0gnrjEBssLNCqLKKjKNI9fk/2/TEHUWJAVxrRff7VX:OsP3lgnPlsLNCqGKjKOk/2/TRxNfpX

Malware Config

Extracted

Family

remcos

Botnet

DOLLAR

C2

107.175.229.139:8087

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-UZXQ9B

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      INVO98765678000.BAT

    • Size

      656KB

    • MD5

      0058da743288cb67e15afbfcb0ab6e1a

    • SHA1

      99cde8486c006b735d1d5111d493303291a847fb

    • SHA256

      412c4f354965eb514a79001b512c70e8d36e1d443fe599aca0916893eab369ef

    • SHA512

      b0cb8a7279ad0e8e49b8b84738e009e93cc2e1e02a909ac88d929a374ff1e6aaa470c5226fcfe24969b4993a7d989a36432d948e1516635e32a1a79d1c06a966

    • SSDEEP

      12288:RaoPTJIU4nr5Kfe8tNCqrKgj65I9ra/Q/fGHAW3A79hRff/aY:RDPFv4nVB8tNCqmgj6Ua/Q/fL97f6Y

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks