General

  • Target

    Remcos Professional.exe

  • Size

    6.5MB

  • Sample

    240519-3yx1gaaa3w

  • MD5

    1ecae7b88236fff686604c40f2ec8ef0

  • SHA1

    5338d387c764b7da0a097e4dd38c17c603e62b08

  • SHA256

    95a3f82e8e77aeb491d7faaf17c4f206763ff7eb08b8696e28ad109b67b984cf

  • SHA512

    6a396bf98181250a2a386c2ee4dbcd8a4be6e23de029d614296e6f33a66b6f6049b487ef07d70936812c31f6cce7bb1b709361b749e0b1ad3507382b26c00a5c

  • SSDEEP

    196608:CyDxS34Qskc93Uuze5VbN0Wp4ctz7Z9aVi:txb1kcWuzku84cNd

Malware Config

Targets

    • Target

      Remcos Professional.exe

    • Size

      6.5MB

    • MD5

      1ecae7b88236fff686604c40f2ec8ef0

    • SHA1

      5338d387c764b7da0a097e4dd38c17c603e62b08

    • SHA256

      95a3f82e8e77aeb491d7faaf17c4f206763ff7eb08b8696e28ad109b67b984cf

    • SHA512

      6a396bf98181250a2a386c2ee4dbcd8a4be6e23de029d614296e6f33a66b6f6049b487ef07d70936812c31f6cce7bb1b709361b749e0b1ad3507382b26c00a5c

    • SSDEEP

      196608:CyDxS34Qskc93Uuze5VbN0Wp4ctz7Z9aVi:txb1kcWuzku84cNd

    • Luca Stealer

      Info stealer written in Rust first seen in July 2022.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks