General

  • Target

    9ca3843ebfe01a5992bbe97e668f55179d915f634fe41cb11aa95fd7745fbc8c

  • Size

    990KB

  • Sample

    240326-2x47qaee28

  • MD5

    c7c9748cbf8f2f767e9ef22dc8052074

  • SHA1

    5ab6e24821294b4bbcab75fbeb5ef2548d8919ce

  • SHA256

    9ca3843ebfe01a5992bbe97e668f55179d915f634fe41cb11aa95fd7745fbc8c

  • SHA512

    395f32a808271d947cea2bca8d99d3db66e98a2ce86e50d4eb4485213d22a3ca910de89f025d2fe84673a8c5c54abe608451ddb562b16499ad5851507a7a6617

  • SSDEEP

    24576:EMuFujdARYQNt2DOzUtsfLmRUS8n98hK/WiWK5K7yVEfu:BuEj4YwPUatS8p/WiP8eVEfu

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

176.31.142.221:4377

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-G326AT

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      9ca3843ebfe01a5992bbe97e668f55179d915f634fe41cb11aa95fd7745fbc8c

    • Size

      990KB

    • MD5

      c7c9748cbf8f2f767e9ef22dc8052074

    • SHA1

      5ab6e24821294b4bbcab75fbeb5ef2548d8919ce

    • SHA256

      9ca3843ebfe01a5992bbe97e668f55179d915f634fe41cb11aa95fd7745fbc8c

    • SHA512

      395f32a808271d947cea2bca8d99d3db66e98a2ce86e50d4eb4485213d22a3ca910de89f025d2fe84673a8c5c54abe608451ddb562b16499ad5851507a7a6617

    • SSDEEP

      24576:EMuFujdARYQNt2DOzUtsfLmRUS8n98hK/WiWK5K7yVEfu:BuEj4YwPUatS8p/WiP8eVEfu

    Score
    10/10
    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)

    • Detects executables packed with SmartAssembly

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks