General

  • Target

    9962c1342cb0ac4e1af01df52f756b70992a0ced5a53e46f770a196033f3762d.exe

  • Size

    956KB

  • Sample

    240604-r3l8zsbb34

  • MD5

    1729c7a8fa433e28bd4de61cc5317840

  • SHA1

    4e93e38d13481d6bd2439613630976409b67983a

  • SHA256

    9962c1342cb0ac4e1af01df52f756b70992a0ced5a53e46f770a196033f3762d

  • SHA512

    6ab82b774b6b2b98edc7cdadb5eeb7c036756b70b28e532c688c49f27ba6982df819baf9be6978bf6c185e1ac267246a607f9c78ecbfd8ac71a8310b3d1a698b

  • SSDEEP

    24576:LYHcfTz0jfyoKtfHdYUIscI0/TvsgUDO/C:Ukn0jfqHdYT0gUi/C

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

hostage345.duckdns.org:18670

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    true

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-7GSJ7O

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      9962c1342cb0ac4e1af01df52f756b70992a0ced5a53e46f770a196033f3762d.exe

    • Size

      956KB

    • MD5

      1729c7a8fa433e28bd4de61cc5317840

    • SHA1

      4e93e38d13481d6bd2439613630976409b67983a

    • SHA256

      9962c1342cb0ac4e1af01df52f756b70992a0ced5a53e46f770a196033f3762d

    • SHA512

      6ab82b774b6b2b98edc7cdadb5eeb7c036756b70b28e532c688c49f27ba6982df819baf9be6978bf6c185e1ac267246a607f9c78ecbfd8ac71a8310b3d1a698b

    • SSDEEP

      24576:LYHcfTz0jfyoKtfHdYUIscI0/TvsgUDO/C:Ukn0jfqHdYT0gUi/C

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks