General

  • Target

    98c6b6fe85f940f647fb9dcb232a837b

  • Size

    1.1MB

  • Sample

    240901-3c4wwsvcrp

  • MD5

    98c6b6fe85f940f647fb9dcb232a837b

  • SHA1

    ae5a09d89039cab8bf272ba241391e1662be8e06

  • SHA256

    00f2682d1cc39105f8573a805b6fd181445eccd2de6b3727f31d0cfa20519378

  • SHA512

    0be6173f01e0bc585f467e1bb9104465dd2886619d8f51ea31feb16821a0719696f94024df84a91f8f97ed77e44cd2cfe03c4da460b186e1b9bf1af66a6839c5

  • SSDEEP

    24576:GrW6ZpTN4bBon3O6N1IZrt0SUqBSpQnrWhg8O1HYjKEPPzK8IVCVek:0WMebBoTNMJ0S2pQcg8MH/EXzK8FIk

Malware Config

Extracted

Family

remcos

Botnet

new2709

C2

nuevospa.con-ip.com:2709

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    loggsdsce

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    Rmc1214550111-8ILYZA

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      98c6b6fe85f940f647fb9dcb232a837b

    • Size

      1.1MB

    • MD5

      98c6b6fe85f940f647fb9dcb232a837b

    • SHA1

      ae5a09d89039cab8bf272ba241391e1662be8e06

    • SHA256

      00f2682d1cc39105f8573a805b6fd181445eccd2de6b3727f31d0cfa20519378

    • SHA512

      0be6173f01e0bc585f467e1bb9104465dd2886619d8f51ea31feb16821a0719696f94024df84a91f8f97ed77e44cd2cfe03c4da460b186e1b9bf1af66a6839c5

    • SSDEEP

      24576:GrW6ZpTN4bBon3O6N1IZrt0SUqBSpQnrWhg8O1HYjKEPPzK8IVCVek:0WMebBoTNMJ0S2pQcg8MH/EXzK8FIk

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks