General

  • Target

    d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118

  • Size

    1.3MB

  • Sample

    240909-j4m8ns1emf

  • MD5

    d5ee80ad1cc23eeb1b25cde2af60c9c1

  • SHA1

    476d6a75a019ed3b2bb866c6f89e2c0970dccf22

  • SHA256

    2a51ff41bcd2af80bf83a79b591a3da996bcc33043cb7f0b7b4493bff7a8a688

  • SHA512

    8dc1e1fe6e06049357fee74820ad0922524a0755867e51a511bd4c948ea2cd9cabc2d5b65bf4e279c2dd55a759aee7d35d683385ae4a08e0c0b40c5c8a4d93eb

  • SSDEEP

    6144:M/1vlzqKOMCfCO0iniUIO++3DwXZvqiQUF5l2Pra:S

Malware Config

Extracted

Family

remcos

Version

2.7.2 Pro

Botnet

Ose_2021 NOIP

C2

gdyhjjdhbvxgsfe.gotdns.ch:2177

Attributes
  • audio_folder

    MicRecords

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    win.exe

  • delete_file

    false

  • hide_file

    true

  • hide_keylog_file

    true

  • install_flag

    true

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    Remcos-PCZ95N

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    win

  • take_screenshot_option

    false

  • take_screenshot_time

    5

  • take_screenshot_title

    wikipedia;solitaire;

Targets

    • Target

      d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118

    • Size

      1.3MB

    • MD5

      d5ee80ad1cc23eeb1b25cde2af60c9c1

    • SHA1

      476d6a75a019ed3b2bb866c6f89e2c0970dccf22

    • SHA256

      2a51ff41bcd2af80bf83a79b591a3da996bcc33043cb7f0b7b4493bff7a8a688

    • SHA512

      8dc1e1fe6e06049357fee74820ad0922524a0755867e51a511bd4c948ea2cd9cabc2d5b65bf4e279c2dd55a759aee7d35d683385ae4a08e0c0b40c5c8a4d93eb

    • SSDEEP

      6144:M/1vlzqKOMCfCO0iniUIO++3DwXZvqiQUF5l2Pra:S

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks