General
-
Target
Backdoor.bat
-
Size
36KB
-
Sample
240929-yfn8ds1eqf
-
MD5
70aadafbc88f381a60171fb21ae4e5ba
-
SHA1
e7cfd181af802976134b23177087ba5dcd518a64
-
SHA256
13641bd80132964e830b3961ccf6300358bfab5149aad32571998a98e2413db1
-
SHA512
19379c0379c5d186514be3faf5839315473d74abe2366f1067fef31fe82300b5f8cf507a58a6e70851e0cb5b76ba4713919ae626232806c953d40a1181146fa1
-
SSDEEP
768:yNnmZ/8vPlLUdhfJ8v6utFpVsuRregrWChgz/b7Dsr1:Unwu4DejVLyOhgz/Yr
Static task
static1
Behavioral task
behavioral1
Sample
Backdoor.exe
Resource
win7-20240708-en
Malware Config
Extracted
remcos
1.7 Pro
Host
top-max.gl.at.ply.gg:65091
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
winka.exe
-
copy_folder
winled
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
methfsaf
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
remcos_wexxmpxcql
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screens
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
Backdoor.bat
-
Size
36KB
-
MD5
70aadafbc88f381a60171fb21ae4e5ba
-
SHA1
e7cfd181af802976134b23177087ba5dcd518a64
-
SHA256
13641bd80132964e830b3961ccf6300358bfab5149aad32571998a98e2413db1
-
SHA512
19379c0379c5d186514be3faf5839315473d74abe2366f1067fef31fe82300b5f8cf507a58a6e70851e0cb5b76ba4713919ae626232806c953d40a1181146fa1
-
SSDEEP
768:yNnmZ/8vPlLUdhfJ8v6utFpVsuRregrWChgz/b7Dsr1:Unwu4DejVLyOhgz/Yr
-
Modifies WinLogon for persistence
-
Adds policy Run key to start application
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Modifies WinLogon
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
2Winlogon Helper DLL
2Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
2Winlogon Helper DLL
2Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
6