General

  • Target

    77d2129f3e711b02b280dc1ebbd724abd4091818b49c40a2c984835be121b993

  • Size

    1.1MB

  • Sample

    240126-ttdllabadj

  • MD5

    f2e66b59e7936e7dbaa932f2278045d5

  • SHA1

    91e932f43a2430c1f095b0305d6fe5578c5ab8ed

  • SHA256

    77d2129f3e711b02b280dc1ebbd724abd4091818b49c40a2c984835be121b993

  • SHA512

    58e5f2df7f34d5ebb408c562572d8d48f858e860baa702330ca40fa2c761bef64c962f41c8b458e20735ba7c3f9935333b8a4e3fa40b08f91a2b05dc60fe70d3

  • SSDEEP

    24576:RwPz15r0t/RvYqagxY4Uu5HSreOBZzkVQ37Li3d:ePz152/aqU4FyJZzOQ3q3

Malware Config

Extracted

Family

remcos

Botnet

PC

C2

107.175.229.139:8087

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    true

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-X5MJYU

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      77d2129f3e711b02b280dc1ebbd724abd4091818b49c40a2c984835be121b993

    • Size

      1.1MB

    • MD5

      f2e66b59e7936e7dbaa932f2278045d5

    • SHA1

      91e932f43a2430c1f095b0305d6fe5578c5ab8ed

    • SHA256

      77d2129f3e711b02b280dc1ebbd724abd4091818b49c40a2c984835be121b993

    • SHA512

      58e5f2df7f34d5ebb408c562572d8d48f858e860baa702330ca40fa2c761bef64c962f41c8b458e20735ba7c3f9935333b8a4e3fa40b08f91a2b05dc60fe70d3

    • SSDEEP

      24576:RwPz15r0t/RvYqagxY4Uu5HSreOBZzkVQ37Li3d:ePz152/aqU4FyJZzOQ3q3

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Detected potential entity reuse from brand microsoft.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Tasks