General

  • Target

    303e415db0644366a316524070b046b1b2a5dd2441258d6295859abc74f352ff.exe

  • Size

    604KB

  • Sample

    240828-byafmazbnh

  • MD5

    fbcf58f9ce64d200379298fcd87aa56b

  • SHA1

    74388b7d29b042a1dabfeda00066eda76a9cf348

  • SHA256

    303e415db0644366a316524070b046b1b2a5dd2441258d6295859abc74f352ff

  • SHA512

    3873f23e8a350b812f7edb6770cc625604a877d658453ddd4f4a84b975d88dbbfb19c071a1f089eeb21fb524edd8bdd395aa5e8b484b87ce29480e9ca39e32df

  • SSDEEP

    12288:MLKzlyrLuJygHZ8C2V3Oliayg2Mj1ngA+0mqwgqi59CU:uIyrCJygn2ZOlX1nz3wgqiHr

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost12

C2

rem24251mr.duckdns.org:24251

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-P0KZ2Q

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      303e415db0644366a316524070b046b1b2a5dd2441258d6295859abc74f352ff.exe

    • Size

      604KB

    • MD5

      fbcf58f9ce64d200379298fcd87aa56b

    • SHA1

      74388b7d29b042a1dabfeda00066eda76a9cf348

    • SHA256

      303e415db0644366a316524070b046b1b2a5dd2441258d6295859abc74f352ff

    • SHA512

      3873f23e8a350b812f7edb6770cc625604a877d658453ddd4f4a84b975d88dbbfb19c071a1f089eeb21fb524edd8bdd395aa5e8b484b87ce29480e9ca39e32df

    • SSDEEP

      12288:MLKzlyrLuJygHZ8C2V3Oliayg2Mj1ngA+0mqwgqi59CU:uIyrCJygn2ZOlX1nz3wgqiHr

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks