General

  • Target

    f8167835ac3a4d30f222f4fc14b5f03e676c68e943a1fe04bad54d50de835494

  • Size

    875KB

  • Sample

    240827-jzt6es1bkf

  • MD5

    973c4be45d0f1f4bc257c3c6a47413c2

  • SHA1

    71b9dfe762e8e4d5e633b7c68dc0256b2249a428

  • SHA256

    f8167835ac3a4d30f222f4fc14b5f03e676c68e943a1fe04bad54d50de835494

  • SHA512

    ea14f6a8b145a0f33c4328ff2236878e073b8f3e961eb30e186d847e969fc044742bd293d0fbf2fb253fbbcdb2f51cf75dcdfc78ea37d2bd2dba70a45b3c391a

  • SSDEEP

    24576:ihP0/5lLb6QfExygkcNxUZ70HjVycO2WhgRx:ih6Bb6QfWiAxUZQZNWhWx

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

teslondon.duckdns.org:2404

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-PQIBUD

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      INV-94485069 STATEMENT BALANCE PAYMENT ADVISE.exe

    • Size

      933KB

    • MD5

      95d1cc2437b6407c0764c2062af93be0

    • SHA1

      b86a89e57594dd5495722cb1fe8b44e32c7c7206

    • SHA256

      8419df9b68b47eb3626dcdcf71f386231ca42c9b8971a6f810d3623115815ef0

    • SHA512

      b2fab22a648d70cc547d7cb71fb02b4976327ba82d30ef35f68b4d5a9c5874d485013c3386f4f22ac6e961c0254b3dedeacca0f7087b3baf62fc961d37d353c1

    • SSDEEP

      24576:ZZ0t1Tdb6e5g9ywkcPxS4/ZkH6ZPVmFBo2:Z0xb6e56SQxS4RpwB5

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks