Resubmissions

29-08-2024 11:25

240829-nh9xrs1bll 10

29-08-2024 10:50

240829-mxlcaaxdmh 10

29-08-2024 10:06

240829-l5ghmawbkg 10

29-08-2024 09:04

240829-k13dvstaqb 10

29-08-2024 08:36

240829-khyyqavaqn 10

General

  • Target

    Sprava0865.zip

  • Size

    788KB

  • Sample

    240829-k13dvstaqb

  • MD5

    4dd783b22b05cec494d7443440b9380a

  • SHA1

    796f2867bee960e1a60696fd9673622238cf6b41

  • SHA256

    0973bf4ab963c2de6c69c3809ed228f0caf00409f4c09e78029640f2026dc19e

  • SHA512

    5a08c5bd8d92284b93e849ce775a6bfd44a51f2374d182e036b64aa84d9e749e3c1f7a94555549745da34d433f7d136afb5d4bc41c4e8d9b0f5f66b6ba8267d9

  • SSDEEP

    192:SzyEsYj3hX+Evuq+yZenc+3hXBE5IQyom3hX+UEgL9alyhFy63hXEIEyIzaGo:Kyyj4EW7y+r3ERyomEUEGkyhFuIExY

Malware Config

Extracted

Family

remcos

Botnet

feetfuck

C2

83.222.191.201:24251

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-XTJ1YO

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      brt_1_0147.doc.lnk

    • Size

      47KB

    • MD5

      8b3dc64090b0b26eda4f1195f493160d

    • SHA1

      bd0b4c1d9e8b84465714287727ba5293f9a8eb61

    • SHA256

      cb43e05491b09d4c7da14d3f42d11a2bb4fa81b0fb47717d44c75426832cdf30

    • SHA512

      ddbe1ad300d613531b6ffcb9a8ff607b1e6e7cf676ce738c31d138e6154ff0ee3c1b8d4d8b67c8fec5da444c845b62475736c228eb89d3b013a3ddcb15365deb

    • SSDEEP

      48:88muavUQSbXTo87Cj3YMEDo/FoZaxCogDDo/LX7LdCZZGXu/dZZIa7x:88y8Nkgm3hX+UxCgLX7BuqQ

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Blocklisted process makes network request

    • Modifies RDP port number used by Windows

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Remote Services: SMB/Windows Admin Shares

      Adversaries may use Valid Accounts to interact with a remote network share using Server Message Block (SMB).

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Event Triggered Execution

1
T1546

Netsh Helper DLL

1
T1546.007

Privilege Escalation

Event Triggered Execution

1
T1546

Netsh Helper DLL

1
T1546.007

Discovery

Query Registry

7
T1012

System Information Discovery

7
T1082

Peripheral Device Discovery

2
T1120

Browser Information Discovery

1
T1217

System Location Discovery

1
T1614

System Language Discovery

1
T1614.001

Lateral Movement

Remote Services

2
T1021

Remote Desktop Protocol

1
T1021.001

SMB/Windows Admin Shares

1
T1021.002

Tasks