General

  • Target

    ee28df351aa1fc3a99678f0cc3649d7b_JaffaCakes118

  • Size

    303KB

  • Sample

    240411-x2xafsaf45

  • MD5

    ee28df351aa1fc3a99678f0cc3649d7b

  • SHA1

    ee1828b45d15e20ea591d95886e8c872c46da094

  • SHA256

    159eaa619cfdce86df2897be4607ef0ac18917d7568411715847d4d8a93fdb49

  • SHA512

    49892ce9702869a13e35b8704e525af1fd11c6d0417efbe5d209607067a411c1fbc898f024041fa2c08a6093e4f5e92d3ad6a3725b334a989b2d824e2b9aa8b3

  • SSDEEP

    6144:hZpvDXGJUpRZxptppTboYW6JHYNXlxoZ3ICJY:hfTGCpPxptPXWdlxeIZ

Malware Config

Extracted

Family

remcos

Version

1.7 Pro

Botnet

Host

C2

xp19.ddns.net:1996

Attributes
  • audio_folder

    audio

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    5

  • copy_file

    nnjk.exe

  • delete_file

    false

  • hide_file

    true

  • hide_keylog_file

    false

  • install_flag

    true

  • install_path

    %AppData%

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    remcos_klyclegait

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screens

  • screenshot_path

    %AppData%

  • screenshot_time

    1

  • startup_value

    win

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      ee28df351aa1fc3a99678f0cc3649d7b_JaffaCakes118

    • Size

      303KB

    • MD5

      ee28df351aa1fc3a99678f0cc3649d7b

    • SHA1

      ee1828b45d15e20ea591d95886e8c872c46da094

    • SHA256

      159eaa619cfdce86df2897be4607ef0ac18917d7568411715847d4d8a93fdb49

    • SHA512

      49892ce9702869a13e35b8704e525af1fd11c6d0417efbe5d209607067a411c1fbc898f024041fa2c08a6093e4f5e92d3ad6a3725b334a989b2d824e2b9aa8b3

    • SSDEEP

      6144:hZpvDXGJUpRZxptppTboYW6JHYNXlxoZ3ICJY:hfTGCpPxptPXWdlxeIZ

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks