General

  • Target

    a8e552944846a2f5e8fefea4a250046da29d74d1f58f7a868258e6ded9597958.exe

  • Size

    4.6MB

  • Sample

    240926-cns1na1eqn

  • MD5

    25860926414bf43383246f7c773a8d6c

  • SHA1

    760390a4a14df085f4c841067f52c79409cdc93e

  • SHA256

    a8e552944846a2f5e8fefea4a250046da29d74d1f58f7a868258e6ded9597958

  • SHA512

    61825ef1b03f5516f2820faae3dad01911054debb714b2162fd28cdc7c26199eb6174eddb3e48a4b200c350a083a561a58bd2724496fcb71e87d4492e2ec5a07

  • SSDEEP

    98304:+pbYDHaUeRG/GnYDievJRVrQo4QGB0s53+sTH7/93veWGLRHHk:+pbu9e+qYDiQf1hfGWsBVb/rGLhE

Malware Config

Extracted

Family

remcos

Botnet

Back-September

C2

fullimmersion777.com:8090

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    hello.exe

  • copy_folder

    windw

  • delete_file

    false

  • hide_file

    true

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    rimcsl-94LESJ

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      a8e552944846a2f5e8fefea4a250046da29d74d1f58f7a868258e6ded9597958.exe

    • Size

      4.6MB

    • MD5

      25860926414bf43383246f7c773a8d6c

    • SHA1

      760390a4a14df085f4c841067f52c79409cdc93e

    • SHA256

      a8e552944846a2f5e8fefea4a250046da29d74d1f58f7a868258e6ded9597958

    • SHA512

      61825ef1b03f5516f2820faae3dad01911054debb714b2162fd28cdc7c26199eb6174eddb3e48a4b200c350a083a561a58bd2724496fcb71e87d4492e2ec5a07

    • SSDEEP

      98304:+pbYDHaUeRG/GnYDievJRVrQo4QGB0s53+sTH7/93veWGLRHHk:+pbu9e+qYDiQf1hfGWsBVb/rGLhE

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks