General

  • Target

    17254631443eae77db10019b6b965fab82d73f71d12f87665a437c5f6e94698ca7d178f318712.datdecoded.exe

  • Size

    482KB

  • Sample

    240904-s1ypnsvaqf

  • MD5

    a909ab87dce35334159062ae7c7802ba

  • SHA1

    d3ad69bd800d12c5080898a93c040d805bbce24c

  • SHA256

    3ebef7667a1f5a1e43bb40f8d141ab80a1b64109c82d16a5308ea608888b38f3

  • SHA512

    4635348d4911b1963e81f299db39f77fff35e279a423ceee44d12f1f9b53469071ed6a047789da3a51cf95f9d6ed20ae45ebbfab612b1ac6297613b48919b617

  • SSDEEP

    6144:7Tz+c6KHYBhDc1RGJdv//NkUn+N5Bkf/0TELRvIZPjbsAOZZmAX4cr8T4:7TlrYw1RUh3NFn+N5WfIQIjbs/ZmTT4

Malware Config

Extracted

Family

remcos

Botnet

Idemili Akpu

C2

closen.kozow.com:2404

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-P9VOBB

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      17254631443eae77db10019b6b965fab82d73f71d12f87665a437c5f6e94698ca7d178f318712.datdecoded.exe

    • Size

      482KB

    • MD5

      a909ab87dce35334159062ae7c7802ba

    • SHA1

      d3ad69bd800d12c5080898a93c040d805bbce24c

    • SHA256

      3ebef7667a1f5a1e43bb40f8d141ab80a1b64109c82d16a5308ea608888b38f3

    • SHA512

      4635348d4911b1963e81f299db39f77fff35e279a423ceee44d12f1f9b53469071ed6a047789da3a51cf95f9d6ed20ae45ebbfab612b1ac6297613b48919b617

    • SSDEEP

      6144:7Tz+c6KHYBhDc1RGJdv//NkUn+N5Bkf/0TELRvIZPjbsAOZZmAX4cr8T4:7TlrYw1RUh3NFn+N5WfIQIjbs/ZmTT4

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks