General

  • Target

    Server_protected.exe

  • Size

    2.8MB

  • Sample

    240329-vgyaxade77

  • MD5

    6c322fce42cecda6465e34424a2071d8

  • SHA1

    b60d414f2a0047fc64066cb321e60149c91abfb3

  • SHA256

    a83b02d1f55f1654d0b38aceb0efe068b62e2d19dcf625af3649bff0fda2b885

  • SHA512

    f1e39bc9253e7ceefb21759e75a0352f65b454b55e5dc6adc098f5ba050fd1da879d8501eb054f920f8a37a0bf5a68c34394089c570af3b3ce12ad14e8bafb71

  • SSDEEP

    49152:ZkpBXL0eovOeG1ahNMWlAUlYoZpwO6v3xOO5UuyYqFSMsyuRjguT3c5gDejqEVLV:ZkpBXLwKwN5pn4xOsNKFNjYxLcmFq0Y

Malware Config

Extracted

Family

remcos

Botnet

Hosting

C2

outdoor-mailed.gl.at.ply.gg:13031

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    BrowsersDLLPackes.exe

  • copy_folder

    Setup

  • delete_file

    false

  • hide_file

    true

  • hide_keylog_file

    false

  • install_flag

    true

  • install_path

    %WinDir%\System32

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-FWVKXO

  • screenshot_crypt

    true

  • screenshot_flag

    true

  • screenshot_folder

    VFilesUpdates

  • screenshot_path

    %WinDir%\System32

  • screenshot_time

    10

  • startup_value

    Windows UAC

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      Server_protected.exe

    • Size

      2.8MB

    • MD5

      6c322fce42cecda6465e34424a2071d8

    • SHA1

      b60d414f2a0047fc64066cb321e60149c91abfb3

    • SHA256

      a83b02d1f55f1654d0b38aceb0efe068b62e2d19dcf625af3649bff0fda2b885

    • SHA512

      f1e39bc9253e7ceefb21759e75a0352f65b454b55e5dc6adc098f5ba050fd1da879d8501eb054f920f8a37a0bf5a68c34394089c570af3b3ce12ad14e8bafb71

    • SSDEEP

      49152:ZkpBXL0eovOeG1ahNMWlAUlYoZpwO6v3xOO5UuyYqFSMsyuRjguT3c5gDejqEVLV:ZkpBXLwKwN5pn4xOsNKFNjYxLcmFq0Y

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks