General

  • Target

    Inquiry for Products.exe

  • Size

    721KB

  • Sample

    240820-nte7jazblb

  • MD5

    9fec99ea343976c49fbf7f8c40333d85

  • SHA1

    d59079f8649a90916d4bbd0a1f5e527c429b1e62

  • SHA256

    7c6848c5d907816fbe03661f4324c6c9ab5c7d959d50cecc40da965aedc92dc6

  • SHA512

    1a2cf791c4f86f667017c52d5e93b9757a4231b7d39084e633b77df1409d0949de2b9d45414b3608f5422a3de23d7b1013b3ef7d1e5edea44c782cf1c0f99ada

  • SSDEEP

    12288:oED6qkM+YPomej3yhGynXKPk4pQ4HLF70OjpeP7r9r/+ppppppppppppppppppp/:oED6Vt3jLMELF708w1q

Malware Config

Extracted

Family

remcos

Botnet

DF1

C2

method8888.ddns.net:6902

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-PFD7ZG

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      Inquiry for Products.exe

    • Size

      721KB

    • MD5

      9fec99ea343976c49fbf7f8c40333d85

    • SHA1

      d59079f8649a90916d4bbd0a1f5e527c429b1e62

    • SHA256

      7c6848c5d907816fbe03661f4324c6c9ab5c7d959d50cecc40da965aedc92dc6

    • SHA512

      1a2cf791c4f86f667017c52d5e93b9757a4231b7d39084e633b77df1409d0949de2b9d45414b3608f5422a3de23d7b1013b3ef7d1e5edea44c782cf1c0f99ada

    • SSDEEP

      12288:oED6qkM+YPomej3yhGynXKPk4pQ4HLF70OjpeP7r9r/+ppppppppppppppppppp/:oED6Vt3jLMELF708w1q

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks