General

  • Target

    71f697fbfa6976c3bac86e640c707e329826f2443aceb23121635e84ac7c3479.exe

  • Size

    875KB

  • Sample

    240724-ckfwxsvgma

  • MD5

    b29eb1b413376848dc700b96a393ab98

  • SHA1

    26b86ed9263feae50c905fd8aac0ba6257cbbd14

  • SHA256

    71f697fbfa6976c3bac86e640c707e329826f2443aceb23121635e84ac7c3479

  • SHA512

    e88673ea821df08febed19f9f22df23eb4d1c95db6ca9e44c405f0d30cf8d7059fae59590ed032a63643fbce827a97e8c4e2f6c7833e9c43da3b8e215e1f772c

  • SSDEEP

    12288:YdbUDRl8U+i+U7o9l6eZi/0K+GKS8Dk3M1DgteFpLXV:MalWi+U7Ylc/H+A8AcRFpLX

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

sembe.duckdns.org:14645

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    nots.dat

  • keylog_flag

    false

  • keylog_folder

    note

  • keylog_path

    %Temp%

  • mouse_option

    false

  • mutex

    Rmc-999Z97

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      71f697fbfa6976c3bac86e640c707e329826f2443aceb23121635e84ac7c3479.exe

    • Size

      875KB

    • MD5

      b29eb1b413376848dc700b96a393ab98

    • SHA1

      26b86ed9263feae50c905fd8aac0ba6257cbbd14

    • SHA256

      71f697fbfa6976c3bac86e640c707e329826f2443aceb23121635e84ac7c3479

    • SHA512

      e88673ea821df08febed19f9f22df23eb4d1c95db6ca9e44c405f0d30cf8d7059fae59590ed032a63643fbce827a97e8c4e2f6c7833e9c43da3b8e215e1f772c

    • SSDEEP

      12288:YdbUDRl8U+i+U7o9l6eZi/0K+GKS8Dk3M1DgteFpLXV:MalWi+U7Ylc/H+A8AcRFpLX

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks