General

  • Target

    f28a8b7fc8c60cb1327b4983a5bf7816_JaffaCakes118

  • Size

    1.4MB

  • Sample

    240416-dk2dasfh37

  • MD5

    f28a8b7fc8c60cb1327b4983a5bf7816

  • SHA1

    ff32ef5aca0a1005ad1871205bf33a1b4a9a6fbd

  • SHA256

    21f9efa2dc23445571bc45df18b359a12282e44af4f33fcdb5b2ced6df8b9db5

  • SHA512

    d240e93296aa32091bd7e15fc4b7c58a8296c1f169dcbe2123fe10ba1f041ac19a14a898ce24417f654c11315fd8226a8cc2f5239094d5be309d9ee9bbe4ab34

  • SSDEEP

    24576:g/Vq04F2xa0yetrA9XFfCRtCtqTbVzPNC+ydQDhgCDCwYXX0YNIc/IFP898uEwN5:6w2LrqVC2tebVzVC+ydQdgCDKUE393N5

Malware Config

Extracted

Family

remcos

Version

3.1.3 Pro

Botnet

RemoteHost

C2

duck50501.hopto.org:50501

Attributes
  • audio_folder

    MicRecords

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    Remcos-QZ529O

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

  • take_screenshot_title

    notepad;solitaire;

Targets

    • Target

      f28a8b7fc8c60cb1327b4983a5bf7816_JaffaCakes118

    • Size

      1.4MB

    • MD5

      f28a8b7fc8c60cb1327b4983a5bf7816

    • SHA1

      ff32ef5aca0a1005ad1871205bf33a1b4a9a6fbd

    • SHA256

      21f9efa2dc23445571bc45df18b359a12282e44af4f33fcdb5b2ced6df8b9db5

    • SHA512

      d240e93296aa32091bd7e15fc4b7c58a8296c1f169dcbe2123fe10ba1f041ac19a14a898ce24417f654c11315fd8226a8cc2f5239094d5be309d9ee9bbe4ab34

    • SSDEEP

      24576:g/Vq04F2xa0yetrA9XFfCRtCtqTbVzPNC+ydQDhgCDCwYXX0YNIc/IFP898uEwN5:6w2LrqVC2tebVzVC+ydQdgCDKUE393N5

    • Detect ZGRat V1

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • CustAttr .NET packer

      Detects CustAttr .NET packer in memory.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks