General

  • Target

    f8c03f656b356b3477ea05d7427bce3e.bin

  • Size

    957KB

  • Sample

    240914-b742la1fjf

  • MD5

    74b2369b8b89d3abacbf5f9eb85d1520

  • SHA1

    37bfeea0b0dda41ce463dd12c083cba025d82850

  • SHA256

    dd8fd3744ffb504accf45d587a8a7ff3c7751ff36dc24f84469d98a8c186e50e

  • SHA512

    6a21277ad3b9ff391da4e68fa0eb072322b166d92301fa8824b24919b66fd9ba7aeab1081d43986af6682697fd5f6581bc38c1cd0765fa0c269e3444f6d9450a

  • SSDEEP

    24576:Z4cjkEkf39U4JRFZdzceVTs6d3qnkHpKUOti9Pm1R4:Z4+kEQ9xxZdzdsi6kMEmP4

Malware Config

Extracted

Family

remcos

Botnet

udu

C2

UDUM.WORK.GD:2431

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    vlc

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    sos

  • mouse_option

    false

  • mutex

    udm-2WYU92

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      fd289f86941e426b8116ead4b68649fac1dc3fc5611da26af9a446f911b30ea5.exe

    • Size

      1.0MB

    • MD5

      f8c03f656b356b3477ea05d7427bce3e

    • SHA1

      b20be63658060f9356e90e7846c2091069950682

    • SHA256

      fd289f86941e426b8116ead4b68649fac1dc3fc5611da26af9a446f911b30ea5

    • SHA512

      35df2187b512fe1908aae5159741e3d666e078fc0e4bbba17c693fdfffab810f8abaf4fe622de3d5a1c32e70db097c0608bc4b9b7723282cd635638971d888d6

    • SSDEEP

      24576:nIUobyTkpVyd+8OuyBNtpFgX9AB5NHY0hBMfUzvB0JERhM1:d96o7OuyBTqCNHY0r50e41

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks