General

  • Target

    cd504cef7f56bd1eab39169ff8a3ae30N

  • Size

    3.4MB

  • Sample

    240913-pwet8a1hkb

  • MD5

    cd504cef7f56bd1eab39169ff8a3ae30

  • SHA1

    d00657d419f95ab98eca4d141eaf910a08de04ad

  • SHA256

    945d6733019ee4f96230d89115077cc29dcce00dda751904d7a2f4f8a8fb9216

  • SHA512

    d545276baccd04d53d4a0f25d1f2111a0bd7cd556aa0f393beb35e6ff693cc6cc61a95f9e411fd47dd724cb166cefc63bb6c82236bb2737f99ec627ad1c1c94d

  • SSDEEP

    98304:X9pJVbueNPOFjk2va/ZopyhrMrZsPIWxVH:X93VBNWFQ2SBgyxPI2V

Malware Config

Extracted

Family

remcos

Botnet

arschlecken

C2

46.8.221.61:443

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    true

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-BYU2FY

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      cd504cef7f56bd1eab39169ff8a3ae30N

    • Size

      3.4MB

    • MD5

      cd504cef7f56bd1eab39169ff8a3ae30

    • SHA1

      d00657d419f95ab98eca4d141eaf910a08de04ad

    • SHA256

      945d6733019ee4f96230d89115077cc29dcce00dda751904d7a2f4f8a8fb9216

    • SHA512

      d545276baccd04d53d4a0f25d1f2111a0bd7cd556aa0f393beb35e6ff693cc6cc61a95f9e411fd47dd724cb166cefc63bb6c82236bb2737f99ec627ad1c1c94d

    • SSDEEP

      98304:X9pJVbueNPOFjk2va/ZopyhrMrZsPIWxVH:X93VBNWFQ2SBgyxPI2V

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Blocklisted process makes network request

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks