Malware Analysis Report

2025-01-02 03:10

Sample ID 240815-2l5dcatflk
Target 6afee9297b79284e33678518f3b97c01ed816e1c387ae7087bc6da29bc389a17
SHA256 6afee9297b79284e33678518f3b97c01ed816e1c387ae7087bc6da29bc389a17
Tags
remcos remotehost discovery rat
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

6afee9297b79284e33678518f3b97c01ed816e1c387ae7087bc6da29bc389a17

Threat Level: Known bad

The file 6afee9297b79284e33678518f3b97c01ed816e1c387ae7087bc6da29bc389a17 was found to be: Known bad.

Malicious Activity Summary

remcos remotehost discovery rat

Remcos

System Location Discovery: System Language Discovery

Unsigned PE

Suspicious use of SetWindowsHookEx

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-08-15 22:41

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-08-15 22:41

Reported

2024-08-15 22:43

Platform

win7-20240729-en

Max time kernel

147s

Max time network

144s

Command Line

"C:\Users\Admin\AppData\Local\Temp\6afee9297b79284e33678518f3b97c01ed816e1c387ae7087bc6da29bc389a17.exe"

Signatures

Remcos

rat remcos

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\6afee9297b79284e33678518f3b97c01ed816e1c387ae7087bc6da29bc389a17.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\6afee9297b79284e33678518f3b97c01ed816e1c387ae7087bc6da29bc389a17.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\6afee9297b79284e33678518f3b97c01ed816e1c387ae7087bc6da29bc389a17.exe

"C:\Users\Admin\AppData\Local\Temp\6afee9297b79284e33678518f3b97c01ed816e1c387ae7087bc6da29bc389a17.exe"

Network

Country Destination Domain Proto
N/A 127.0.0.1:59089 tcp
US 8.8.8.8:53 legacyrem.duckdns.org udp
MY 103.186.116.130:59089 legacyrem.duckdns.org tcp
N/A 127.0.0.1:59089 tcp
MY 103.186.116.130:59089 legacyrem.duckdns.org tcp
N/A 127.0.0.1:59089 tcp
MY 103.186.116.130:59089 legacyrem.duckdns.org tcp
N/A 127.0.0.1:59089 tcp
MY 103.186.116.130:59089 legacyrem.duckdns.org tcp
MY 103.186.116.130:59089 legacyrem.duckdns.org tcp
N/A 127.0.0.1:59089 tcp
N/A 127.0.0.1:59089 tcp
MY 103.186.116.130:59089 legacyrem.duckdns.org tcp
N/A 127.0.0.1:59089 tcp
MY 103.186.116.130:59089 legacyrem.duckdns.org tcp
N/A 127.0.0.1:59089 tcp
MY 103.186.116.130:59089 legacyrem.duckdns.org tcp
N/A 127.0.0.1:59089 tcp
MY 103.186.116.130:59089 legacyrem.duckdns.org tcp
N/A 127.0.0.1:59089 tcp
MY 103.186.116.130:59089 legacyrem.duckdns.org tcp
N/A 127.0.0.1:59089 tcp
US 8.8.8.8:53 legacyrem.duckdns.org udp
MY 103.186.116.130:59089 legacyrem.duckdns.org tcp
N/A 127.0.0.1:59089 tcp
MY 103.186.116.130:59089 legacyrem.duckdns.org tcp
N/A 127.0.0.1:59089 tcp
MY 103.186.116.130:59089 legacyrem.duckdns.org tcp
N/A 127.0.0.1:59089 tcp
MY 103.186.116.130:59089 legacyrem.duckdns.org tcp
N/A 127.0.0.1:59089 tcp
MY 103.186.116.130:59089 legacyrem.duckdns.org tcp
N/A 127.0.0.1:59089 tcp
MY 103.186.116.130:59089 legacyrem.duckdns.org tcp
N/A 127.0.0.1:59089 tcp
MY 103.186.116.130:59089 legacyrem.duckdns.org tcp
N/A 127.0.0.1:59089 tcp
US 8.8.8.8:53 legacyrem.duckdns.org udp
MY 103.186.116.130:59089 legacyrem.duckdns.org tcp

Files

memory/1064-0-0x0000000000590000-0x0000000000615000-memory.dmp

memory/1064-1-0x0000000000220000-0x00000000002A2000-memory.dmp

memory/1064-2-0x0000000000220000-0x00000000002A2000-memory.dmp

memory/1064-6-0x0000000000220000-0x00000000002A2000-memory.dmp

memory/1064-5-0x0000000000220000-0x00000000002A2000-memory.dmp

memory/1064-7-0x0000000000220000-0x00000000002A2000-memory.dmp

memory/1064-8-0x0000000000220000-0x00000000002A2000-memory.dmp

memory/1064-11-0x0000000000590000-0x0000000000615000-memory.dmp

memory/1064-12-0x0000000000220000-0x00000000002A2000-memory.dmp

memory/1064-14-0x0000000000220000-0x00000000002A2000-memory.dmp

memory/1064-15-0x0000000000220000-0x00000000002A2000-memory.dmp

memory/1064-16-0x0000000000220000-0x00000000002A2000-memory.dmp

memory/1064-17-0x0000000000220000-0x00000000002A2000-memory.dmp

memory/1064-20-0x0000000000220000-0x00000000002A2000-memory.dmp

memory/1064-21-0x0000000000220000-0x00000000002A2000-memory.dmp

memory/1064-23-0x0000000000220000-0x00000000002A2000-memory.dmp

C:\ProgramData\remcos\logs.dat

MD5 f784370dff1cc0f618864ea187afe26e
SHA1 2cc65378339f661c02136980ab84cf3b81a822f4
SHA256 d6e04093938f0a59d7473dc17897828c1a948178314c1284db61e16776bdfcba
SHA512 65939368ffaf0a90b95b46db8c096f6d033c16db9889292f62391cdb92c58d9db9f7b01981399d1270c67bd5e391c991a2bd6317dd60e9f77844daf1ece13e94

memory/1064-25-0x0000000000220000-0x00000000002A2000-memory.dmp

memory/1064-26-0x0000000000220000-0x00000000002A2000-memory.dmp

memory/1064-27-0x0000000000220000-0x00000000002A2000-memory.dmp

memory/1064-28-0x0000000000220000-0x00000000002A2000-memory.dmp

memory/1064-30-0x0000000000220000-0x00000000002A2000-memory.dmp

memory/1064-32-0x0000000000220000-0x00000000002A2000-memory.dmp

memory/1064-33-0x0000000000220000-0x00000000002A2000-memory.dmp

memory/1064-34-0x0000000000220000-0x00000000002A2000-memory.dmp

memory/1064-35-0x0000000000220000-0x00000000002A2000-memory.dmp

memory/1064-36-0x0000000000220000-0x00000000002A2000-memory.dmp

memory/1064-38-0x0000000000220000-0x00000000002A2000-memory.dmp

memory/1064-39-0x0000000000220000-0x00000000002A2000-memory.dmp

memory/1064-40-0x0000000000220000-0x00000000002A2000-memory.dmp

memory/1064-43-0x0000000000220000-0x00000000002A2000-memory.dmp

memory/1064-45-0x0000000000220000-0x00000000002A2000-memory.dmp

memory/1064-46-0x0000000000220000-0x00000000002A2000-memory.dmp

memory/1064-47-0x0000000000220000-0x00000000002A2000-memory.dmp

memory/1064-49-0x0000000000220000-0x00000000002A2000-memory.dmp

memory/1064-50-0x0000000000220000-0x00000000002A2000-memory.dmp

memory/1064-51-0x0000000000220000-0x00000000002A2000-memory.dmp

memory/1064-52-0x0000000000220000-0x00000000002A2000-memory.dmp

memory/1064-54-0x0000000000220000-0x00000000002A2000-memory.dmp

memory/1064-57-0x0000000000220000-0x00000000002A2000-memory.dmp

memory/1064-58-0x0000000000220000-0x00000000002A2000-memory.dmp

memory/1064-61-0x0000000000220000-0x00000000002A2000-memory.dmp

memory/1064-67-0x0000000000220000-0x00000000002A2000-memory.dmp

memory/1064-68-0x0000000000220000-0x00000000002A2000-memory.dmp

memory/1064-70-0x0000000000220000-0x00000000002A2000-memory.dmp

memory/1064-71-0x0000000000220000-0x00000000002A2000-memory.dmp

memory/1064-73-0x0000000000220000-0x00000000002A2000-memory.dmp

memory/1064-75-0x0000000000220000-0x00000000002A2000-memory.dmp

memory/1064-76-0x0000000000220000-0x00000000002A2000-memory.dmp

memory/1064-77-0x0000000000220000-0x00000000002A2000-memory.dmp

memory/1064-81-0x0000000000220000-0x00000000002A2000-memory.dmp

memory/1064-83-0x0000000000220000-0x00000000002A2000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-08-15 22:41

Reported

2024-08-15 22:43

Platform

win10v2004-20240802-en

Max time kernel

148s

Max time network

148s

Command Line

"C:\Users\Admin\AppData\Local\Temp\6afee9297b79284e33678518f3b97c01ed816e1c387ae7087bc6da29bc389a17.exe"

Signatures

Remcos

rat remcos

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\6afee9297b79284e33678518f3b97c01ed816e1c387ae7087bc6da29bc389a17.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\6afee9297b79284e33678518f3b97c01ed816e1c387ae7087bc6da29bc389a17.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\6afee9297b79284e33678518f3b97c01ed816e1c387ae7087bc6da29bc389a17.exe

"C:\Users\Admin\AppData\Local\Temp\6afee9297b79284e33678518f3b97c01ed816e1c387ae7087bc6da29bc389a17.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
N/A 127.0.0.1:59089 tcp
US 8.8.8.8:53 25.140.123.92.in-addr.arpa udp
US 8.8.8.8:53 legacyrem.duckdns.org udp
MY 103.186.116.130:59089 legacyrem.duckdns.org tcp
US 8.8.8.8:53 0.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
N/A 127.0.0.1:59089 tcp
MY 103.186.116.130:59089 legacyrem.duckdns.org tcp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
N/A 127.0.0.1:59089 tcp
MY 103.186.116.130:59089 legacyrem.duckdns.org tcp
N/A 127.0.0.1:59089 tcp
MY 103.186.116.130:59089 legacyrem.duckdns.org tcp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
N/A 127.0.0.1:59089 tcp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
MY 103.186.116.130:59089 legacyrem.duckdns.org tcp
N/A 127.0.0.1:59089 tcp
MY 103.186.116.130:59089 legacyrem.duckdns.org tcp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
N/A 127.0.0.1:59089 tcp
MY 103.186.116.130:59089 legacyrem.duckdns.org tcp
US 8.8.8.8:53 240.143.123.92.in-addr.arpa udp
N/A 127.0.0.1:59089 tcp
US 8.8.8.8:53 legacyrem.duckdns.org udp
MY 103.186.116.130:59089 legacyrem.duckdns.org tcp
N/A 127.0.0.1:59089 tcp
MY 103.186.116.130:59089 legacyrem.duckdns.org tcp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
N/A 127.0.0.1:59089 tcp
MY 103.186.116.130:59089 legacyrem.duckdns.org tcp
N/A 127.0.0.1:59089 tcp
MY 103.186.116.130:59089 legacyrem.duckdns.org tcp
N/A 127.0.0.1:59089 tcp
MY 103.186.116.130:59089 legacyrem.duckdns.org tcp
N/A 127.0.0.1:59089 tcp
MY 103.186.116.130:59089 legacyrem.duckdns.org tcp
US 8.8.8.8:53 58.99.105.20.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
N/A 127.0.0.1:59089 tcp
MY 103.186.116.130:59089 legacyrem.duckdns.org tcp
N/A 127.0.0.1:59089 tcp
US 8.8.8.8:53 legacyrem.duckdns.org udp
MY 103.186.116.130:59089 legacyrem.duckdns.org tcp
N/A 127.0.0.1:59089 tcp
MY 103.186.116.130:59089 legacyrem.duckdns.org tcp
N/A 127.0.0.1:59089 tcp

Files

memory/448-0-0x0000000000590000-0x0000000000615000-memory.dmp

memory/448-1-0x0000000000620000-0x00000000006A2000-memory.dmp

memory/448-2-0x0000000000620000-0x00000000006A2000-memory.dmp

memory/448-5-0x0000000000620000-0x00000000006A2000-memory.dmp

memory/448-6-0x0000000000620000-0x00000000006A2000-memory.dmp

memory/448-7-0x0000000000620000-0x00000000006A2000-memory.dmp

memory/448-8-0x0000000000620000-0x00000000006A2000-memory.dmp

memory/448-11-0x0000000000590000-0x0000000000615000-memory.dmp

memory/448-12-0x0000000000620000-0x00000000006A2000-memory.dmp

memory/448-13-0x0000000000620000-0x00000000006A2000-memory.dmp

memory/448-14-0x0000000000620000-0x00000000006A2000-memory.dmp

memory/448-16-0x0000000000620000-0x00000000006A2000-memory.dmp

memory/448-18-0x0000000000620000-0x00000000006A2000-memory.dmp

memory/448-19-0x0000000000620000-0x00000000006A2000-memory.dmp

memory/448-22-0x0000000000620000-0x00000000006A2000-memory.dmp

memory/448-23-0x0000000000620000-0x00000000006A2000-memory.dmp

memory/448-24-0x0000000000620000-0x00000000006A2000-memory.dmp

C:\ProgramData\remcos\logs.dat

MD5 741a4a2a5531aa1b1ba5e4baf4738477
SHA1 85fd55c95eaa660fccf73b67da8fb0985718109f
SHA256 c352372da90f8d82bcdd9899ad8ec62fd1a771fae26e7b0d3d77eece4a64414c
SHA512 ac714c8b7fc7d5aa0ce1e35c50916b0f174ca93b64f39eef9d81b6397bd40b9455678e91afab63544758ceec44e661ed0aae0e95d1d3c7b67b1028cc1bc29507

memory/448-26-0x0000000000620000-0x00000000006A2000-memory.dmp

memory/448-27-0x0000000000620000-0x00000000006A2000-memory.dmp

memory/448-28-0x0000000000620000-0x00000000006A2000-memory.dmp

memory/448-31-0x0000000000620000-0x00000000006A2000-memory.dmp

memory/448-33-0x0000000000620000-0x00000000006A2000-memory.dmp

memory/448-34-0x0000000000620000-0x00000000006A2000-memory.dmp

memory/448-35-0x0000000000620000-0x00000000006A2000-memory.dmp

memory/448-39-0x0000000000620000-0x00000000006A2000-memory.dmp

memory/448-40-0x0000000000620000-0x00000000006A2000-memory.dmp

memory/448-43-0x0000000000620000-0x00000000006A2000-memory.dmp

memory/448-44-0x0000000000620000-0x00000000006A2000-memory.dmp

memory/448-46-0x0000000000620000-0x00000000006A2000-memory.dmp

memory/448-47-0x0000000000620000-0x00000000006A2000-memory.dmp

memory/448-48-0x0000000000620000-0x00000000006A2000-memory.dmp

memory/448-49-0x0000000000620000-0x00000000006A2000-memory.dmp

memory/448-52-0x0000000000620000-0x00000000006A2000-memory.dmp

memory/448-53-0x0000000000620000-0x00000000006A2000-memory.dmp

memory/448-55-0x0000000000620000-0x00000000006A2000-memory.dmp

memory/448-56-0x0000000000620000-0x00000000006A2000-memory.dmp

memory/448-59-0x0000000000620000-0x00000000006A2000-memory.dmp

memory/448-60-0x0000000000620000-0x00000000006A2000-memory.dmp

memory/448-62-0x0000000000620000-0x00000000006A2000-memory.dmp

memory/448-63-0x0000000000620000-0x00000000006A2000-memory.dmp

memory/448-65-0x0000000000620000-0x00000000006A2000-memory.dmp

memory/448-67-0x0000000000620000-0x00000000006A2000-memory.dmp

memory/448-69-0x0000000000620000-0x00000000006A2000-memory.dmp

memory/448-73-0x0000000000620000-0x00000000006A2000-memory.dmp

memory/448-74-0x0000000000620000-0x00000000006A2000-memory.dmp

memory/448-75-0x0000000000620000-0x00000000006A2000-memory.dmp

memory/448-76-0x0000000000620000-0x00000000006A2000-memory.dmp

memory/448-78-0x0000000000620000-0x00000000006A2000-memory.dmp

memory/448-79-0x0000000000620000-0x00000000006A2000-memory.dmp

memory/448-82-0x0000000000620000-0x00000000006A2000-memory.dmp

memory/448-83-0x0000000000620000-0x00000000006A2000-memory.dmp

memory/448-85-0x0000000000620000-0x00000000006A2000-memory.dmp

memory/448-86-0x0000000000620000-0x00000000006A2000-memory.dmp