General

  • Target

    PO 738900.gz

  • Size

    962KB

  • Sample

    240516-sey4baac65

  • MD5

    a95ea5ce1e3314a90767322439f7a809

  • SHA1

    25b20353529f0e9627e8f53cbfb993cf6dd87608

  • SHA256

    79f3f61ce35754dd4a5f3f94297af6c529671f27215af4eac1b0a71807b9e615

  • SHA512

    a5398907d16cfbca8e021b4641e7802d6e9e0044d6372db62414a6bc0c6f3b356076805532b45cf3caf8e5b087bcbec99d2bbded21acb49e1028a0a0fab11b5d

  • SSDEEP

    24576:MqMNL9Mq5vxIN2eP0uwiK39GisTOZaImGNepZb1QQOlDqGNRQy:30L9MqHIQswp9sqgZb1mlDqPy

Malware Config

Extracted

Family

remcos

Botnet

76364

C2

103.150.8.12:5689

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-FF0K7G

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      PO 738900.exe

    • Size

      1.1MB

    • MD5

      a4df734fada4dec0bebcbbbed4e083ab

    • SHA1

      283763090c6af71ef60d76b4515c9edebd416bcf

    • SHA256

      e0d74fa44286f3a4c4c4c2fc151a339f487c2af644fb9691016dcf057b3bd343

    • SHA512

      914b580fefa91d948a256c2f2ab39b18f36f631e7ff9c387888334521221466814af45bde59b59420c8eb6f22d0808afc6e27f3b562d5c495ab8b8a7666af637

    • SSDEEP

      24576:bOp3fxqwcD01FUKer5zdzDarNhrBAJhDdiGXck5WZ7XZeLBmWlo:bOZOqbeDsBixy7XZsblo

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks