General

  • Target

    04092024_0835_03092024_Public Holiday_Notice 2024.rar

  • Size

    828KB

  • Sample

    240904-kg2yzsxaqn

  • MD5

    7d821624d279b986bc763b094bf5b405

  • SHA1

    e21520d8e0daa20b61e75bb86af086e782a97c46

  • SHA256

    10f0d16023678289131ac94f84e8e4e749e894764ffc598b03f96102213725e9

  • SHA512

    9e17013164f7160964122a684521af9c011c8ca1e4e1ac546e736d9015da88a7fda63e52ee0baca61d49e50824878ab4d39ddfe54e99dbb2b847c36d938f55c0

  • SSDEEP

    24576:v7ZEfXqLcQ4U6Jp9CEYlTg8A0m9UAy8LXsNzkM:v7HbIIpq0xARLsNzkM

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

194.169.175.190:2404

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-LBZ2BK

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      Public Holiday_Notice 2024.exe

    • Size

      852KB

    • MD5

      47dfa0eb4d05af59b16e0810c4f0f1ea

    • SHA1

      0291227cb783e4b8f2eeed450ce9d1b6fb4568ae

    • SHA256

      59dee7790a8cac5dec0024dbee07035b5be582c535099ef099c7dd09a82536c4

    • SHA512

      74d5ebef2b72aaf740a6808abd3efcd8d044f8df55d9f5d7fb3f54adf3ecd8e8ad60489e05bf04cc55548e10cd7c143060f630a0d68cbf449b7cc6de04e900e1

    • SSDEEP

      12288:FYV6MorX7qzuC3QHO9FQVHPF51jgcTL2LGF80j/s/hopXRn/1WmUgcUI31l8bqoH:6BXu9HGaVHcEg/Gx+mU3FlQFF

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses Microsoft Outlook accounts

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks