General

  • Target

    2976-34-0x0000000000400000-0x0000000000417000-memory.dmp

  • Size

    92KB

  • Sample

    240511-j7fb8sgd2w

  • MD5

    be359e977e4f84e90d66703d7db01e20

  • SHA1

    786123e05622a4faa70dbef725b0af0fc45641d6

  • SHA256

    d680f58a9803eb57e4564754e91fbad12f92a0850d14cb6e0b145d868edaa213

  • SHA512

    37a24484cdc3ad36bf1938582b6f2575487934ba0f5f2a427b108fe517115415a53d692accc13a1b572582df375ff90ff3812fea78e6851d204f59976a3a0af2

  • SSDEEP

    1536:ohhW0YTGZWdVseJxaM9kraLdV2QkQ1TbPX8IHOCkIsI4ESKFNTh9E+JP19qkPIhS:uhzYTGWVvJ8f2v1TbPzuMsIFScNThy+B

Malware Config

Extracted

Family

remcos

Version

1.7 Pro

Botnet

gg

C2

62.102.148.185:9771

Attributes
  • audio_folder

    audio

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    5

  • copy_file

    remcos.exe

  • copy_folder

    remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    newstart

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    remcos_wgwfvnfssp

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screens

  • screenshot_path

    %AppData%

  • screenshot_time

    1

  • startup_value

    remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      2976-34-0x0000000000400000-0x0000000000417000-memory.dmp

    • Size

      92KB

    • MD5

      be359e977e4f84e90d66703d7db01e20

    • SHA1

      786123e05622a4faa70dbef725b0af0fc45641d6

    • SHA256

      d680f58a9803eb57e4564754e91fbad12f92a0850d14cb6e0b145d868edaa213

    • SHA512

      37a24484cdc3ad36bf1938582b6f2575487934ba0f5f2a427b108fe517115415a53d692accc13a1b572582df375ff90ff3812fea78e6851d204f59976a3a0af2

    • SSDEEP

      1536:ohhW0YTGZWdVseJxaM9kraLdV2QkQ1TbPX8IHOCkIsI4ESKFNTh9E+JP19qkPIhS:uhzYTGWVvJ8f2v1TbPzuMsIFScNThy+B

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks