General

  • Target

    f7cca6f85fcacfbf3382ae3b97637387d23e07fa47739d0ea7ad1480efa776b1

  • Size

    928KB

  • Sample

    240823-bpc56azglp

  • MD5

    aef805a09ab0c35ac2e5740f210ef2e6

  • SHA1

    13aeafe6f6eba0f0247fef41b1583c8cad0f77e8

  • SHA256

    f7cca6f85fcacfbf3382ae3b97637387d23e07fa47739d0ea7ad1480efa776b1

  • SHA512

    b5bcca73ed0f496df31d270132d8bc3bc275c09f644a700cc0b71099bdce708e0a2aa88e92a6cc2b51d0cd684cf6a4d83c9451b8dc33d5cd7d9eda06e33d3a3d

  • SSDEEP

    24576:K53zig0r14THco8AK3XBFoUxm94qUm15hR6JLlM1/7w+sA5PX:EiH1McYi7rU9rvhR6o1XX

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

194.169.175.190:2404

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-LBZ2BK

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      Topaz Revised Vessel Pacificpdf.exe

    • Size

      1.3MB

    • MD5

      a427fb52c91af9905ae9342fda2cae62

    • SHA1

      6ab4e88d669e199766fe47700340d98928fd9e5d

    • SHA256

      13e0f498713a8332c6de3766269a07b27c87515fde4c2b92ca5a4433e8a692c9

    • SHA512

      50f669db2df1dcec19c9dfb7031a496dcb04f75d6adf0fd2f101636b49f0365685bac8b7f853d500c40b02ec8e30013cc8b52c3ce7229475923c88339e23e9d6

    • SSDEEP

      24576:QqDEvCTbMWu7rQYlBQcBiT6rprG8a1doUxYv4qUmxXh76Jrl21/7wesAZPx:QTvC/MTQYxsWR7a1drivrlh76m19

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks