General

  • Target

    20082024_1400_19082024_Quotatio19082024.rar

  • Size

    546KB

  • Sample

    240820-ra4ybsvhkd

  • MD5

    dc40f4bdcd026d95f46e26bfbe7936aa

  • SHA1

    156041c3a723b2268103892f07495fd032d4f6ce

  • SHA256

    3365e779f6bb5037404b967bb9dd5651bbbeb32f7f2ea4c63ca21acea0f7b697

  • SHA512

    414cf6ee28a9527947e02bbc29a3ecfbf9099fc4e3e1d2f4816ece15f6be83abb1c21191cbba2b272cefad1b58ac1446a312f040c3dd0e55afea96b187bbcb38

  • SSDEEP

    12288:i36eZLk13oCXsoA+aqfxClnHo0wnizE46g8551Fa6aNqGGX:UDZLk1Zso5a4nyEd+DsGGX

Malware Config

Extracted

Family

remcos

Botnet

Ready

C2

freak4u.duckdns.org:22891

freak4u.duckdns.org:22892

hgbourst28lasor2.duckdns.org:22891

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    true

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    lmzoiuts.dat

  • keylog_flag

    false

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    alsmoritstf-T1OUDN

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      Quotatio19082024.exe

    • Size

      568KB

    • MD5

      91dd6ee8e62b032c8264b3b55e69eddb

    • SHA1

      f2688c3f49fec062e9ad7a2dec3571cd668aa879

    • SHA256

      895417f8fd168a02d71365994d4e4500cdbf31af01be6ce8998fc38a342cac2e

    • SHA512

      194bb6a4314d9815851373b9559cc52b9d2712988d44e06db8ece1c9d45b98e41c15d51984e6ed4182adb17eedd278dd47cda9e42c01a3efc941fdfd0c3400e7

    • SSDEEP

      12288:5T54bavS+gjBubIHBR5h2rZgS+0cWz198PCg7XwoCaz:5T54OK+A/Bl2rZEW59hg7X7Lz

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks