General

  • Target

    Purchase Order.exe

  • Size

    902KB

  • Sample

    240923-rs412sydqp

  • MD5

    171f8a0f5bba2ba4fab8d479c65f6651

  • SHA1

    a7e8546d3b1dc9482e5800497eb482518efd4427

  • SHA256

    cd76524a5a1a193336ce0a72efa54af99367743c2d380d0416a1d09a516fad8b

  • SHA512

    3e113f1f1afd56c9ba8ae44f24480f89a60db7f62432cfbf9b77320747f48881ac81bfa692c18692a92906372de70bd8538eea4a88c253fa7f4a6b67d4b5915c

  • SSDEEP

    24576:TlFCHP+tB+XNpYpKwiQgAG5FgfsmW1bp9xDe6:pFEtXopK1QVG0fUpT

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

127.0.0.1:59321

nnamoo.duckdns.org:59321

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-41EVS0

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      Purchase Order.exe

    • Size

      902KB

    • MD5

      171f8a0f5bba2ba4fab8d479c65f6651

    • SHA1

      a7e8546d3b1dc9482e5800497eb482518efd4427

    • SHA256

      cd76524a5a1a193336ce0a72efa54af99367743c2d380d0416a1d09a516fad8b

    • SHA512

      3e113f1f1afd56c9ba8ae44f24480f89a60db7f62432cfbf9b77320747f48881ac81bfa692c18692a92906372de70bd8538eea4a88c253fa7f4a6b67d4b5915c

    • SSDEEP

      24576:TlFCHP+tB+XNpYpKwiQgAG5FgfsmW1bp9xDe6:pFEtXopK1QVG0fUpT

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.