General

  • Target

    f2e66b59e7936e7dbaa932f2278045d5.bin

  • Size

    1.0MB

  • Sample

    240110-d74f6sdbal

  • MD5

    fcc928da68b4f58652b3e238438c603d

  • SHA1

    f4ca850c763a432ff1a3946aa25e085ee9f53e39

  • SHA256

    e261f51e8dce919f8b20a1a87a3de91d18834b457f978ffed02bb48277b84d4e

  • SHA512

    ad39b7a1a370e61bb26c498c740b5b0fbc49d01fcc9c5c0d53865a711b9b7005834e4265a4435ab478c92d2603da6e51f81ada2818ed7add9a3180da6560f9b0

  • SSDEEP

    24576:rUDYsD1NFrL2G9RLwg9ezLUDQjgKJ81efy/EJx8Hw5t4:rUssDv9R0+ezLUDQjTzP82t4

Malware Config

Extracted

Family

remcos

Botnet

PC

C2

107.175.229.139:8087

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    true

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-X5MJYU

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      77d2129f3e711b02b280dc1ebbd724abd4091818b49c40a2c984835be121b993.exe

    • Size

      1.1MB

    • MD5

      f2e66b59e7936e7dbaa932f2278045d5

    • SHA1

      91e932f43a2430c1f095b0305d6fe5578c5ab8ed

    • SHA256

      77d2129f3e711b02b280dc1ebbd724abd4091818b49c40a2c984835be121b993

    • SHA512

      58e5f2df7f34d5ebb408c562572d8d48f858e860baa702330ca40fa2c761bef64c962f41c8b458e20735ba7c3f9935333b8a4e3fa40b08f91a2b05dc60fe70d3

    • SSDEEP

      24576:RwPz15r0t/RvYqagxY4Uu5HSreOBZzkVQ37Li3d:ePz152/aqU4FyJZzOQ3q3

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Tasks