Resubmissions

23-05-2024 10:22

240523-md97asda29 10

General

  • Target

    ZEMUN EUR 63210,00 20240417172825.xls

  • Size

    243KB

  • Sample

    240523-md97asda29

  • MD5

    4816c91c7315f48b5fbb776d90316a0f

  • SHA1

    1e743a1cfe0d2ec9234f90551274759d59ded6bf

  • SHA256

    bff53c74bf4fb85ebe5ad269a1c8ecf2e0f03b026faa29c34683d21f13c1011e

  • SHA512

    f1bba49b16272c2536a7ec6a0c6677901e4e0519746d6c832247f4719452b2a5e9c97582fee1d2a097d986b69a4f15ce9b1c9259cbf76f9d560ef70934aaf8a8

  • SSDEEP

    6144:Ae4UcLe0JOqPQZR8MDdATCR3tSeT0W8rfzvwomokd2:OUP/qPQZR8MxAm/SBW8Lmrd

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

sembe.duckdns.org:14645

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    nots.dat

  • keylog_flag

    false

  • keylog_folder

    note

  • keylog_path

    %Temp%

  • mouse_option

    false

  • mutex

    Rmc-999Z97

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      ZEMUN EUR 63210,00 20240417172825.xls

    • Size

      243KB

    • MD5

      4816c91c7315f48b5fbb776d90316a0f

    • SHA1

      1e743a1cfe0d2ec9234f90551274759d59ded6bf

    • SHA256

      bff53c74bf4fb85ebe5ad269a1c8ecf2e0f03b026faa29c34683d21f13c1011e

    • SHA512

      f1bba49b16272c2536a7ec6a0c6677901e4e0519746d6c832247f4719452b2a5e9c97582fee1d2a097d986b69a4f15ce9b1c9259cbf76f9d560ef70934aaf8a8

    • SSDEEP

      6144:Ae4UcLe0JOqPQZR8MDdATCR3tSeT0W8rfzvwomokd2:OUP/qPQZR8MxAm/SBW8Lmrd

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Abuses OpenXML format to download file from external location

    • Deletes itself

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks