General

  • Target

    KRISTIN's+2023+Organizer+ExtensionPDF.zip

  • Size

    41.3MB

  • Sample

    240815-efsq2aybqk

  • MD5

    5c967cda0ba79bb41406b8c503817657

  • SHA1

    97f1da7e60cee2e21e819c3f84f56dbba81ac522

  • SHA256

    4b0034a2e86bf558c75772bbeb8a538f1b3f6574227b5dbf8374eaa4046637c7

  • SHA512

    5efd2b88d5c771f23b7624da56aa7daaed301ce8bad236ac6108006ddf01049cd6bf18089917b688d397e9bfdc8c5abca30cd7ea83edbc86a67eeb6cdfaabb06

  • SSDEEP

    786432:RNtA6KVqCBx1Ow1JAHRq/86q5KgkIVMRC1iJV9ieKfz8VTg694tb4/rdycVw3NcP:vtA64x1OwHTqh3M4sJV9iug6ub4AcVck

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

privmerkt.com:6042

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-LKQWZ1

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      KRISTIN's+2023+Organizer+ExtensionPDF.zip

    • Size

      41.3MB

    • MD5

      5c967cda0ba79bb41406b8c503817657

    • SHA1

      97f1da7e60cee2e21e819c3f84f56dbba81ac522

    • SHA256

      4b0034a2e86bf558c75772bbeb8a538f1b3f6574227b5dbf8374eaa4046637c7

    • SHA512

      5efd2b88d5c771f23b7624da56aa7daaed301ce8bad236ac6108006ddf01049cd6bf18089917b688d397e9bfdc8c5abca30cd7ea83edbc86a67eeb6cdfaabb06

    • SSDEEP

      786432:RNtA6KVqCBx1Ow1JAHRq/86q5KgkIVMRC1iJV9ieKfz8VTg694tb4/rdycVw3NcP:vtA64x1OwHTqh3M4sJV9iug6ub4AcVck

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of NtCreateThreadExHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks