General

  • Target

    339dcd1a52b9095623e72c678f20ed01.bin

  • Size

    872KB

  • Sample

    240829-bgzzysxfqr

  • MD5

    3e0b84594043290d1802e1600a00f100

  • SHA1

    1e0c72fe460102dad48c6869bf7de47536ccdc24

  • SHA256

    7a59546ab79e0b1d73dca0d2dcfdeea4da848dbc33fb18f1c5c211759526362f

  • SHA512

    200f56012fa9ce0ee5c1358cced21a6e1aeb316ac52f47bc10d5c7356b17ef8f0afebc5b8f26004b4caf6095b7161440cc535d5d824162a4bc9122566284669f

  • SSDEEP

    24576:YhV/KsmfnAfiV7FQav1qkF6BMjmeoPpAhWELRepx:YhTsnAWQaatxmjLR+x

Malware Config

Extracted

Family

remcos

Botnet

BCV

C2

tvq3101.sytes.net:1974

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-9PFUGS

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      1414f1e42aa7b329d33ddbf9c64024eb822b1f61780bede84aa260724bd36b60.exe

    • Size

      927KB

    • MD5

      339dcd1a52b9095623e72c678f20ed01

    • SHA1

      a2bd542dcddefc2ece12e47b380bc343ead31604

    • SHA256

      1414f1e42aa7b329d33ddbf9c64024eb822b1f61780bede84aa260724bd36b60

    • SHA512

      06b4ab19a5cd8957d879ed141e9d9ad5a0c4898d2bb460f4796d2d04014a67a10fe00bc6243a8936c8ec1b9be7d6cf4ce1a8a6c278067e6ea86ed5a2d40150a7

    • SSDEEP

      24576:JBKlj3XZEwjwxSonfaM00VMNSfQ/woYhkToooZ:2ljHZncct7IoY9bZ

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks