General

  • Target

    e309d1d65510a23a42802d4fefe26620N.exe

  • Size

    874KB

  • Sample

    240819-ng72savcjm

  • MD5

    e309d1d65510a23a42802d4fefe26620

  • SHA1

    07c0d5f0ae07a6ee4c039050f8c26beb6216419b

  • SHA256

    99bcee03cdb32c2bcf607b82e750d90ee4c0ca9e37f784ca4cd3e4b888977e58

  • SHA512

    31f5e77bf4a35e76c6b5328c5ad3c540c64df74b48ce7954118c728e52ae069fb3fca17ac8b2c83624fd528702772450781d013df91f8d0b67e93c2131b6db87

  • SSDEEP

    24576:KBXu9HGaVHjdjRxKPzRkRYoNjRCLOU/vh37:Kw9VHjdtxKrRkZNIOUnh

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

194.169.175.190:2404

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-LBZ2BK

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      e309d1d65510a23a42802d4fefe26620N.exe

    • Size

      874KB

    • MD5

      e309d1d65510a23a42802d4fefe26620

    • SHA1

      07c0d5f0ae07a6ee4c039050f8c26beb6216419b

    • SHA256

      99bcee03cdb32c2bcf607b82e750d90ee4c0ca9e37f784ca4cd3e4b888977e58

    • SHA512

      31f5e77bf4a35e76c6b5328c5ad3c540c64df74b48ce7954118c728e52ae069fb3fca17ac8b2c83624fd528702772450781d013df91f8d0b67e93c2131b6db87

    • SSDEEP

      24576:KBXu9HGaVHjdjRxKPzRkRYoNjRCLOU/vh37:Kw9VHjdtxKrRkZNIOUnh

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses Microsoft Outlook accounts

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks