Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    8154dcd3b9aa77539b16ed4b113c7739357c26a7e5961ea7747aa45bcc285bdc

  • Size

    903KB

  • Sample

    240910-jensxasdnk

  • MD5

    5a59d4efbfef61e055728b6169185e1c

  • SHA1

    63b2bdf29a9be7ccc6ea46179c1ef5582752204a

  • SHA256

    8154dcd3b9aa77539b16ed4b113c7739357c26a7e5961ea7747aa45bcc285bdc

  • SHA512

    0e64c6d8b419942f1f51729ebe1cacf5e07fe6ef0c80c8563de5a2b9de0cbfbaff98247691fa89d6c5984e0061a57ff7f80d27c581e0976ec1fe76167cb19e0c

  • SSDEEP

    24576:fZgCieTkCqPo0I2MOkJHwTYWMiQzGwFRv4tseOed:yeTIPo0ZRYZFjzGw/q

Malware Config

Extracted

Family

remcos

Botnet

IRN

C2

irnserv1.ddns.net:4424

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    true

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-CA8761

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      TNT invoice.exe

    • Size

      962KB

    • MD5

      36a61907068929b0cea9cfad4bb45b5f

    • SHA1

      564d7d74f94fe07b5590a6c17b0caad3536c61c6

    • SHA256

      b041b54fdd8bac5ca781c5b064235a29cc29480edb623a216a2a3d8aef71ea16

    • SHA512

      6e3f7cc4d0995c7937049cde030f983ca0d80afdf08dfa3defb14a6778349ae8296ee950407f5f0a1e42eb32122aa8a9b104a40a4f7171fd2c6c162896e2fc1d

    • SSDEEP

      24576:OkGY2eTMCq/oDIALSR7mD60noFfzE5BG:PAeTw/oDnWoD6GoBE5E

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.