General

  • Target

    Trojan.MSIL.Hanoone.pz-f7c1e9684f43216c9927edaa229f71db824d3c64585c9496b7458951e6001172N

  • Size

    2.0MB

  • Sample

    240916-rrzd6ssejr

  • MD5

    d0a57dccb86063c714f279e9858a14c0

  • SHA1

    859fc7e9c24114cfed2220bc428ca45e515be87b

  • SHA256

    f7c1e9684f43216c9927edaa229f71db824d3c64585c9496b7458951e6001172

  • SHA512

    855048fe5c7c2c39e9ce99cd8f2b85862375e3e63376314bae366fcaa3d09a2de71db97dfafe574e259c1efa772deda6a725c9a85e62f09483b03c087ff5d0d3

  • SSDEEP

    24576:zD39v74lfGQrFUspugRNJI2DJ53J/J/L5dJPj8/j73Anet9/wI:zp7E+QrFUBgq2Q

Malware Config

Extracted

Family

remcos

Botnet

Host

C2

213.183.58.19:4000

Attributes
  • audio_folder

    audio

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    5

  • copy_file

    remcos.exe

  • copy_folder

    remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    true

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    true

  • keylog_file

    read.dat

  • keylog_flag

    false

  • keylog_folder

    CastC

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    remcos_sccafsoidz

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screens

  • screenshot_path

    %AppData%

  • screenshot_time

    1

  • startup_value

    remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Extracted

Family

remcos

Version

1.7 Pro

Botnet

Host

C2

213.183.58.19:4000

Attributes
  • audio_folder

    audio

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    5

  • copy_file

    remcos.exe

  • copy_folder

    remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    true

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    true

  • keylog_file

    read.dat

  • keylog_flag

    false

  • keylog_folder

    CastC

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    remcos_sccafsoidz

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screens

  • screenshot_path

    %AppData%

  • screenshot_time

    1

  • startup_value

    remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      Trojan.MSIL.Hanoone.pz-f7c1e9684f43216c9927edaa229f71db824d3c64585c9496b7458951e6001172N

    • Size

      2.0MB

    • MD5

      d0a57dccb86063c714f279e9858a14c0

    • SHA1

      859fc7e9c24114cfed2220bc428ca45e515be87b

    • SHA256

      f7c1e9684f43216c9927edaa229f71db824d3c64585c9496b7458951e6001172

    • SHA512

      855048fe5c7c2c39e9ce99cd8f2b85862375e3e63376314bae366fcaa3d09a2de71db97dfafe574e259c1efa772deda6a725c9a85e62f09483b03c087ff5d0d3

    • SSDEEP

      24576:zD39v74lfGQrFUspugRNJI2DJ53J/J/L5dJPj8/j73Anet9/wI:zp7E+QrFUBgq2Q

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.