General

  • Target

    NEW ORDER 04154SHOP N0AWE12893.bat

  • Size

    4.7MB

  • Sample

    240415-fypmrsfe78

  • MD5

    55f48dd51a9f5e43d1c206ad4f972661

  • SHA1

    dcdb11a9f0d5b2ac01600737f96383550096ac4a

  • SHA256

    d23b1e9ce21335de1ccfebc24b556c14bf193fd025167d68e0af9e061f9b02bd

  • SHA512

    08f343befefbeb42c302518092d3832f5b27e43fa9003a05822523b39ac38d53f49711af9dd165cbd1b1d906fdf711486ac875954990849007422971fee0ac1e

  • SSDEEP

    49152:KqDXIfW2UShFhv2Nym/GmpXhvPBi3M5xfrcjKiUns19M8X0KtC8v7sMDlZg6HcNn:R

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

192.3.216.139:44800

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-2Z66H0

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      NEW ORDER 04154SHOP N0AWE12893.bat

    • Size

      4.7MB

    • MD5

      55f48dd51a9f5e43d1c206ad4f972661

    • SHA1

      dcdb11a9f0d5b2ac01600737f96383550096ac4a

    • SHA256

      d23b1e9ce21335de1ccfebc24b556c14bf193fd025167d68e0af9e061f9b02bd

    • SHA512

      08f343befefbeb42c302518092d3832f5b27e43fa9003a05822523b39ac38d53f49711af9dd165cbd1b1d906fdf711486ac875954990849007422971fee0ac1e

    • SSDEEP

      49152:KqDXIfW2UShFhv2Nym/GmpXhvPBi3M5xfrcjKiUns19M8X0KtC8v7sMDlZg6HcNn:R

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • ModiLoader Second Stage

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks