General

  • Target

    DHL SHIPPING DOC 5596370080.exe

  • Size

    1000KB

  • Sample

    240611-w4wk9swhnn

  • MD5

    56729ceff54040279ee91421f81b2eb6

  • SHA1

    4bff52933e1beb10ca9b24f4ca520824f7dd4d43

  • SHA256

    effb59e562e566570fbd4dc5df959dd14ad9f0a181b65189644fdfe9425692a4

  • SHA512

    d6a558125bd4a4055e1abb6646b522ed96eef9b58890d64dd9e64a5974121dc1c5a76357c588be7bb89ca53a439946593e044bf9ce692944f8c99e7f0c9723f1

  • SSDEEP

    24576:u9jH3DIiUsayYAATnSy8phsWX73hdQByIdq7ZIBrE24BvGxtP:oP1wRA8o+I4fKZid4c/P

Malware Config

Extracted

Family

remcos

Botnet

76364

C2

103.150.8.12:5689

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-FF0K7G

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      DHL SHIPPING DOC 5596370080.exe

    • Size

      1000KB

    • MD5

      56729ceff54040279ee91421f81b2eb6

    • SHA1

      4bff52933e1beb10ca9b24f4ca520824f7dd4d43

    • SHA256

      effb59e562e566570fbd4dc5df959dd14ad9f0a181b65189644fdfe9425692a4

    • SHA512

      d6a558125bd4a4055e1abb6646b522ed96eef9b58890d64dd9e64a5974121dc1c5a76357c588be7bb89ca53a439946593e044bf9ce692944f8c99e7f0c9723f1

    • SSDEEP

      24576:u9jH3DIiUsayYAATnSy8phsWX73hdQByIdq7ZIBrE24BvGxtP:oP1wRA8o+I4fKZid4c/P

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks