General

  • Target

    ec5062b6c5c6648b188b29b28741d4911a36986ec5adccad8ecffa5e8b41734b.xlsx

  • Size

    49KB

  • Sample

    240319-djeg5sgf3y

  • MD5

    de81ca904b88240d1bdf3e6ce5211367

  • SHA1

    04b96d917496857a4e5cafd042e1594323437a5b

  • SHA256

    ec5062b6c5c6648b188b29b28741d4911a36986ec5adccad8ecffa5e8b41734b

  • SHA512

    c52d1d62b0c73527ed2d4ea2a93444b2904c3e91d8b3296300c9c87ee8d288b23e0f779b4f3851886c230c5be8e84b15ee456eea086a7070444c1049d5bb7373

  • SSDEEP

    1536:hX682vSrL9JfQsZvYjOEpE0Ff9hZ+U04mjDP:hX682arL9Cd6unv

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

buike0147.duckdns.org:14645

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-1C7Y8W

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      ec5062b6c5c6648b188b29b28741d4911a36986ec5adccad8ecffa5e8b41734b.xlsx

    • Size

      49KB

    • MD5

      de81ca904b88240d1bdf3e6ce5211367

    • SHA1

      04b96d917496857a4e5cafd042e1594323437a5b

    • SHA256

      ec5062b6c5c6648b188b29b28741d4911a36986ec5adccad8ecffa5e8b41734b

    • SHA512

      c52d1d62b0c73527ed2d4ea2a93444b2904c3e91d8b3296300c9c87ee8d288b23e0f779b4f3851886c230c5be8e84b15ee456eea086a7070444c1049d5bb7373

    • SSDEEP

      1536:hX682vSrL9JfQsZvYjOEpE0Ff9hZ+U04mjDP:hX682arL9Cd6unv

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)

    • Detects executables built or packed with MPress PE compressor

    • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers

    • Detects executables referencing many email and collaboration clients. Observed in information stealers

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Blocklisted process makes network request

    • Abuses OpenXML format to download file from external location

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks