Malware Analysis Report

2024-12-07 22:24

Sample ID 240407-bd4hzaha64
Target 10bdf4a0ad2aca2cc323434b00d89958.bin
SHA256 e54f171ba44e1007ce228fa12d46728bf01d90194efae9a537e590dcba84e682
Tags
remotehost remcos
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

e54f171ba44e1007ce228fa12d46728bf01d90194efae9a537e590dcba84e682

Threat Level: Known bad

The file 10bdf4a0ad2aca2cc323434b00d89958.bin was found to be: Known bad.

Malicious Activity Summary

remotehost remcos

Remcos family

Unsigned PE

Suspicious use of SetWindowsHookEx

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-04-07 01:02

Signatures

Remcos family

remcos

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-07 01:02

Reported

2024-04-07 01:05

Platform

win7-20240215-en

Max time kernel

149s

Max time network

153s

Command Line

"C:\Users\Admin\AppData\Local\Temp\3ae2a8fcc969ec131e6ea2387dbdbdc6dd9ef216fc4a04990a403b7a38494778.exe"

Signatures

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\3ae2a8fcc969ec131e6ea2387dbdbdc6dd9ef216fc4a04990a403b7a38494778.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\3ae2a8fcc969ec131e6ea2387dbdbdc6dd9ef216fc4a04990a403b7a38494778.exe

"C:\Users\Admin\AppData\Local\Temp\3ae2a8fcc969ec131e6ea2387dbdbdc6dd9ef216fc4a04990a403b7a38494778.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 rxms.duckdns.org udp
US 89.117.23.25:57832 rxms.duckdns.org tcp
US 8.8.8.8:53 geoplugin.net udp
NL 178.237.33.50:80 geoplugin.net tcp

Files

C:\ProgramData\remcos\logs.dat

MD5 2097f2748bb2555b473b29475bb1337e
SHA1 ce2c1c50e76b44754be4ad1fe1cebbdfc5361311
SHA256 3e89df41eb58fa84dd2421663ee50ec6426c42a3c1e45411c2c99938f6a2ff16
SHA512 2b6f29c2f66da47fb8115caa151bdff82333f4bf1defbe110f021a59a3d6f8cfac4440a875a466d1d9d55be5c9d97fa7fed299b12c09626a864f7cc428216c8e

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-07 01:02

Reported

2024-04-07 01:05

Platform

win10v2004-20240226-en

Max time kernel

148s

Max time network

153s

Command Line

"C:\Users\Admin\AppData\Local\Temp\3ae2a8fcc969ec131e6ea2387dbdbdc6dd9ef216fc4a04990a403b7a38494778.exe"

Signatures

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\3ae2a8fcc969ec131e6ea2387dbdbdc6dd9ef216fc4a04990a403b7a38494778.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\3ae2a8fcc969ec131e6ea2387dbdbdc6dd9ef216fc4a04990a403b7a38494778.exe

"C:\Users\Admin\AppData\Local\Temp\3ae2a8fcc969ec131e6ea2387dbdbdc6dd9ef216fc4a04990a403b7a38494778.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 rxms.duckdns.org udp
US 89.117.23.25:57832 rxms.duckdns.org tcp
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 geoplugin.net udp
NL 178.237.33.50:80 geoplugin.net tcp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 25.23.117.89.in-addr.arpa udp
US 8.8.8.8:53 23.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 50.33.237.178.in-addr.arpa udp
US 20.231.121.79:80 tcp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 65.139.73.23.in-addr.arpa udp
US 8.8.8.8:53 249.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 8.173.189.20.in-addr.arpa udp

Files

C:\ProgramData\remcos\logs.dat

MD5 b24ecf3b125ab13467df5b73328578d2
SHA1 ee933ab2770843dddc59e34572ddfc5d2db55658
SHA256 0ab138b3dab2f8bff0ef472666a5e810f63caddf117bb965ddf0cc2459005069
SHA512 1eb05a95953ed70c4a219a7cd70172b4af1030ef254e44bfa1fd09f81e5969fe1f7ec8b0843f8c0b0bd07cc5a5f5d075f2167817f396882cb2dedb9e696a720d