General

  • Target

    c111221c3c59b9f9c50d57c3880a4c09ecbc358e5bbe69e44b3945660ceb07bb.rar

  • Size

    930KB

  • Sample

    240213-fp974sch5t

  • MD5

    e03428797abb4b701df5e4699c7bec9d

  • SHA1

    d6a29e373bb094cdc5ff9d403f5791024ca559bb

  • SHA256

    c111221c3c59b9f9c50d57c3880a4c09ecbc358e5bbe69e44b3945660ceb07bb

  • SHA512

    654e1821fc03612060da1abddf5ec3d5fb5b4d8d46c97414e36f69eac12d17f520cb1a0b0684fad5c588e2d62a25ed571e79172fe9e6ec7d05df2d9b8ce5330e

  • SSDEEP

    24576:0ldATcQDCpry1L+asMLybwl6vJBKiDfq6+:0PAgQWy1S4LybwEBdqv

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

P2-bin

C2

84.38.132.126:61445

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-ANE1CN

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      new order 02-09-2024 567645678765.exe

    • Size

      1013KB

    • MD5

      6c8cbdc86413e22170390a8d9c482073

    • SHA1

      18c47e58c9f19d5e5a47b661a41063bce7008ec5

    • SHA256

      737cedd9e82602536f0b02d2608b856c49b158928de47bb891d401bae810bdc4

    • SHA512

      5c40082ccb71f9a1265dcbea868a72569f3b51cddfa1570ef9a4240701abaf4a21a45f23b301e5795480c34885cb2ba0a74b3e4c94ad7e4f4f974e443233a23f

    • SSDEEP

      24576:EGUmDDxcxFlRhhXOYtiP1mD9qL6EwthL3LQxM7OyeNBnVj/K1:EGZfx+vRhOi9qathLEm7OrvV

    Score
    10/10
    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks