General

  • Target

    979645cb3ebaa1883b0edb4ab2d16e085b5f8206945c843de50a106a8f6f8d64

  • Size

    521KB

  • Sample

    240909-frrhsawalh

  • MD5

    315816d740587b3e574af546df4c2106

  • SHA1

    b93a3a634d6746cfdc0e9d65e0ae865dc32d5271

  • SHA256

    979645cb3ebaa1883b0edb4ab2d16e085b5f8206945c843de50a106a8f6f8d64

  • SHA512

    d1aaa3ecbd36fb00ceea3928535698d7441c6aff3f87c354f29f1b55f23b27be31b3ae3673ea66fcc3d8a86d603ab2f700a324fd48c3a2129f3c8e0ca7f2a2ea

  • SSDEEP

    6144:fTz+c6KHYBhDc1RGJdv//NkUn+N5Bkf/0TELRvIZPjbsAOZZBAXccr1T4:fTlrYw1RUh3NFn+N5WfIQIjbs/ZBuT4

Malware Config

Extracted

Family

remcos

Botnet

Sept. 03

C2

154.216.20.211:6902

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-HPM63O

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      979645cb3ebaa1883b0edb4ab2d16e085b5f8206945c843de50a106a8f6f8d64

    • Size

      521KB

    • MD5

      315816d740587b3e574af546df4c2106

    • SHA1

      b93a3a634d6746cfdc0e9d65e0ae865dc32d5271

    • SHA256

      979645cb3ebaa1883b0edb4ab2d16e085b5f8206945c843de50a106a8f6f8d64

    • SHA512

      d1aaa3ecbd36fb00ceea3928535698d7441c6aff3f87c354f29f1b55f23b27be31b3ae3673ea66fcc3d8a86d603ab2f700a324fd48c3a2129f3c8e0ca7f2a2ea

    • SSDEEP

      6144:fTz+c6KHYBhDc1RGJdv//NkUn+N5Bkf/0TELRvIZPjbsAOZZBAXccr1T4:fTlrYw1RUh3NFn+N5WfIQIjbs/ZBuT4

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks