General

  • Target

    ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2.exe

  • Size

    1.4MB

  • Sample

    240823-mhpfds1epr

  • MD5

    f7d7753ba906c463af989cc1ea66a3a9

  • SHA1

    459798998c25c93b2787038a5dcd156ba73bc006

  • SHA256

    ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2

  • SHA512

    109c5a877a47013121bebe86c3451e8bdaa7d8bc42bead5de28f75dbc5bae953c5a60008bd16d73bb65b63f7284bf72111769d2160bde5715c0a7b4a9f3a0d7e

  • SSDEEP

    24576:cqDEvCTbMWu7rQYlBQcBiT6rprG8auyedioIpgYL9MDIaBg:cTvC/MTQYxsWR7auFibTL7

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

eadzagba1.duckdns.org:4877

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-X3UMUO

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2.exe

    • Size

      1.4MB

    • MD5

      f7d7753ba906c463af989cc1ea66a3a9

    • SHA1

      459798998c25c93b2787038a5dcd156ba73bc006

    • SHA256

      ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2

    • SHA512

      109c5a877a47013121bebe86c3451e8bdaa7d8bc42bead5de28f75dbc5bae953c5a60008bd16d73bb65b63f7284bf72111769d2160bde5715c0a7b4a9f3a0d7e

    • SSDEEP

      24576:cqDEvCTbMWu7rQYlBQcBiT6rprG8auyedioIpgYL9MDIaBg:cTvC/MTQYxsWR7auFibTL7

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks