General

  • Target

    b3c084f9fd5fe18129978cccf6d2d2ac972d5c7db3a7378372476f535cc16b8e.exe

  • Size

    863KB

  • Sample

    240916-by26msshnp

  • MD5

    1c2a46d46812b1424ad44ac59b4c8d9a

  • SHA1

    ad2822fc0804fad19c1d959f02c0011d80a7ab4c

  • SHA256

    b3c084f9fd5fe18129978cccf6d2d2ac972d5c7db3a7378372476f535cc16b8e

  • SHA512

    0e3107208813adb9ca79720bea24dcc333bff9c7bc084b31a7abc92ecb1d09ed7deffe9014d0b85f4154aad6499d626eec85e0f43c570954afd437151219bc39

  • SSDEEP

    24576:D1YaXjYr93cjbHRtEmWHs7FK5WQSDndP:D13MrhcjbHRWmh7c5MDdP

Malware Config

Extracted

Family

remcos

Botnet

3456789

C2

172.93.220.148:45682

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    765-8M14I5

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      b3c084f9fd5fe18129978cccf6d2d2ac972d5c7db3a7378372476f535cc16b8e.exe

    • Size

      863KB

    • MD5

      1c2a46d46812b1424ad44ac59b4c8d9a

    • SHA1

      ad2822fc0804fad19c1d959f02c0011d80a7ab4c

    • SHA256

      b3c084f9fd5fe18129978cccf6d2d2ac972d5c7db3a7378372476f535cc16b8e

    • SHA512

      0e3107208813adb9ca79720bea24dcc333bff9c7bc084b31a7abc92ecb1d09ed7deffe9014d0b85f4154aad6499d626eec85e0f43c570954afd437151219bc39

    • SSDEEP

      24576:D1YaXjYr93cjbHRtEmWHs7FK5WQSDndP:D13MrhcjbHRWmh7c5MDdP

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks