General

  • Target

    vape.exe

  • Size

    60.3MB

  • Sample

    240517-yttd9sgf35

  • MD5

    52948b3f8fb248f63377473b579aaab4

  • SHA1

    0913e3f4f6e2a6e227a8b385e6ec1bbf5dda5ffa

  • SHA256

    7e1c90f994d36d2bd947109c72fe6ffe39cfe54e8064b618255e27d0328717a4

  • SHA512

    a03e7c4b9032e6e66b94e0199c7cfaafc0191064ba81cb78a08a0e82a8acabca3982d826570216ac9712354e96d5f7f653dc71d7c9f7e8f2c8dd6c40330d37ea

  • SSDEEP

    1572864:vHNfIc/bDS7YL3iUqekIR681ttq+NDVK3ZiFx4mdSG:vZzz+7stopJwCmIG

Malware Config

Extracted

Family

remcos

Botnet

Hosting

C2

education-delete.gl.at.ply.gg:49970

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    Start.exe

  • copy_folder

    Start

  • delete_file

    false

  • hide_file

    true

  • hide_keylog_file

    true

  • install_flag

    true

  • install_path

    %WinDir%

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    WD

  • mouse_option

    false

  • mutex

    Rmc-DTLAVU

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Start

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      vape.exe

    • Size

      60.3MB

    • MD5

      52948b3f8fb248f63377473b579aaab4

    • SHA1

      0913e3f4f6e2a6e227a8b385e6ec1bbf5dda5ffa

    • SHA256

      7e1c90f994d36d2bd947109c72fe6ffe39cfe54e8064b618255e27d0328717a4

    • SHA512

      a03e7c4b9032e6e66b94e0199c7cfaafc0191064ba81cb78a08a0e82a8acabca3982d826570216ac9712354e96d5f7f653dc71d7c9f7e8f2c8dd6c40330d37ea

    • SSDEEP

      1572864:vHNfIc/bDS7YL3iUqekIR681ttq+NDVK3ZiFx4mdSG:vZzz+7stopJwCmIG

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks