General

  • Target

    c008880967c64851e47f97ca7ed5a9f8d2029dd87b3ae6eb77f19c43d8fefd89.exe

  • Size

    1013KB

  • Sample

    240712-xa2e4axere

  • MD5

    8f251ec69c2faae7090b2bf78cfd4881

  • SHA1

    8cdc6e16ad2adcbb3002b772d05e78a725be2c9a

  • SHA256

    c008880967c64851e47f97ca7ed5a9f8d2029dd87b3ae6eb77f19c43d8fefd89

  • SHA512

    1b05341213933cbe65d39c402e58e042ec39bae56350201c04f0043e35cd39428b0aeed1737f3bc7765b79adbca94c58cfe6d177f0cb4ef9d79a053ed89381df

  • SSDEEP

    24576:K1+mRLN3T4GNvq1dtY4eyjT3ew6Bd8p/VDTNl8pT+qEl:aRpcGNvqdY4eyjTHW8p/hJqe

Malware Config

Extracted

Family

remcos

Botnet

THEONE

C2

45.66.231.218:4259

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-UII1DP

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      c008880967c64851e47f97ca7ed5a9f8d2029dd87b3ae6eb77f19c43d8fefd89.exe

    • Size

      1013KB

    • MD5

      8f251ec69c2faae7090b2bf78cfd4881

    • SHA1

      8cdc6e16ad2adcbb3002b772d05e78a725be2c9a

    • SHA256

      c008880967c64851e47f97ca7ed5a9f8d2029dd87b3ae6eb77f19c43d8fefd89

    • SHA512

      1b05341213933cbe65d39c402e58e042ec39bae56350201c04f0043e35cd39428b0aeed1737f3bc7765b79adbca94c58cfe6d177f0cb4ef9d79a053ed89381df

    • SSDEEP

      24576:K1+mRLN3T4GNvq1dtY4eyjT3ew6Bd8p/VDTNl8pT+qEl:aRpcGNvqdY4eyjTHW8p/hJqe

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks