General

  • Target

    3c9065a948387b76124f035b405d3644ac960b18d8ca7b0437c02d8c98b8b811.exe

  • Size

    1.3MB

  • Sample

    240408-pf2daacb9w

  • MD5

    1d779d40600de25a3e0bcf6953d2716e

  • SHA1

    56c59c5f0cf6a074c4d2830b4475c3fd0b1ce2d1

  • SHA256

    3c9065a948387b76124f035b405d3644ac960b18d8ca7b0437c02d8c98b8b811

  • SHA512

    7bb58f0cc67dba7dd8b33e06f6a775eba649680f104c5d097870bea88b108fa221891339cad1f8c4c1dfaf894380e65dd9d728aacbd4c0c0575ac8af949accff

  • SSDEEP

    24576:6qDEvCTbMWu7rQYlBQcBiT6rprG8aJUv3K/nmmUcgy+R+q:6TvC/MTQYxsWR7aJRnzUTzR

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

193.222.96.75:8823

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-TNRDZX

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      3c9065a948387b76124f035b405d3644ac960b18d8ca7b0437c02d8c98b8b811.exe

    • Size

      1.3MB

    • MD5

      1d779d40600de25a3e0bcf6953d2716e

    • SHA1

      56c59c5f0cf6a074c4d2830b4475c3fd0b1ce2d1

    • SHA256

      3c9065a948387b76124f035b405d3644ac960b18d8ca7b0437c02d8c98b8b811

    • SHA512

      7bb58f0cc67dba7dd8b33e06f6a775eba649680f104c5d097870bea88b108fa221891339cad1f8c4c1dfaf894380e65dd9d728aacbd4c0c0575ac8af949accff

    • SSDEEP

      24576:6qDEvCTbMWu7rQYlBQcBiT6rprG8aJUv3K/nmmUcgy+R+q:6TvC/MTQYxsWR7aJRnzUTzR

    Score
    10/10
    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

MITRE ATT&CK Matrix

Tasks