General

  • Target

    a44d77d22771b1964622f6b3a0e94f6c7abf35e578ee931583a288e686b6da3d

  • Size

    838KB

  • Sample

    240814-xbfj1sxepc

  • MD5

    b91bea0321093a305006d3ba471ac47c

  • SHA1

    daa2d0bc9bfebb75c9b393a21bfe196de682ac5e

  • SHA256

    a44d77d22771b1964622f6b3a0e94f6c7abf35e578ee931583a288e686b6da3d

  • SHA512

    a37c05425045bcef6573c2b6df512473c8d19ca880eafc9954f05c45cdc78d4010df2355cd5c1cf35490974176d2cfa96bc4a25d31118c9afbf60caa95540ec1

  • SSDEEP

    12288:NbBLqbt3QGBeooWQN+fZPYuk0Roh+am9MGy3mwpqYoCiecMgbuoOak4OAQWcz6g:NbgmG6DN6W+ab73bpqYXIkRAQWcB

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

eadzagba1.duckdns.org:4877

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-X3UMUO

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      samples & specifications.exe

    • Size

      2.0MB

    • MD5

      b080ea268e4427342f2927443077147f

    • SHA1

      ff70334bbc04859c3022c4ea5932da51ddef6d7d

    • SHA256

      c1c3c20f09b3626d71bee368cef603ac62fa5df11c8b2faefc43278e3c94b440

    • SHA512

      00d55fa44efbd0e67cf8f239b771a5e320a5feb07d0d6418aabd1bffafd820e86fde832bd99a11fca23ffca1b8225d27b42a43c67c25b2b195edece3132880f6

    • SSDEEP

      12288:5PLMb1BQGByoSuG3+hZPYak0VSh+EC9MQy3+IpqYoseecigbuoOikMOAQWcz6T:6AGYjrQ8+E/h3dpqYJEk9AQWcQ

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks