General

  • Target

    45df1e9a2808d2e4fb67b308af593ebb3637078ef7bc86eb4cb7f37dd45b20b7

  • Size

    848KB

  • Sample

    240916-hq6x7athna

  • MD5

    c13c9a36f50cb387c8b75d3d1d3ddca6

  • SHA1

    2e6586724e504a50d38e69785068f43baf9f0661

  • SHA256

    45df1e9a2808d2e4fb67b308af593ebb3637078ef7bc86eb4cb7f37dd45b20b7

  • SHA512

    2a1031b74d90efc96f789159acd9a5057e212f42d3398e56c859e3a81d7da6b9564b67f6f4af214ab19a5190e90348b87b6c64a4ef89175828806895ba8bfee7

  • SSDEEP

    24576:jq4w5laql7fn8O/qRD4G0HWxLtOajOA9YCHJFAxG/I:jjqhlQvRMtHwAajOEZ1/I

Malware Config

Extracted

Family

remcos

Botnet

IRN

C2

irnserv1.ddns.net:4424

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    true

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-CA8761

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      TNT INVOICE 9.16.2024.exe

    • Size

      874KB

    • MD5

      fa85476ee938c50ec297a18b6d84ad2d

    • SHA1

      24687b69c21fdcc298fbc977548fcd34f1e7d8ee

    • SHA256

      4dd5c06062753a3522e3a1bb4a10d29639b467599913a27d77af2866dd095a32

    • SHA512

      7a486263b9de67d94b7d90c2e60c285cceaa8bfa0fb825b6aee6eafe753178316bf051b877ee797509becf59617246cea5cbcba2804fbb7f1252248508121758

    • SSDEEP

      24576:OEqKo59aqP71pME/qVt4G0PWxxtO6rO69qCVJFOxGoF:OE38bPQRVatPAA6rO6Fb

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks