General

  • Target

    ee1e59674071a1c4541fbaf6f6f582cc.exe

  • Size

    379KB

  • Sample

    241002-sapdbawbre

  • MD5

    ee1e59674071a1c4541fbaf6f6f582cc

  • SHA1

    f1b3689389c286197e297a903942d20d3527d2c0

  • SHA256

    e6142fe26f2b69d6a0c29383eda5ba3ea883d706aa86f406a79668a346907d34

  • SHA512

    dd3d6dc531b453da6b583da7e0ec40b2f25ebe541ae0a0189d07be4a95491e1d6174c3b2cc9cf97d7fa773991b1fc4b4335e1cc9fa305c6c253fd451474e7e5e

  • SSDEEP

    384:zYfZf7DceK5eDKe5Teuek41UQFn0FWkorqVsiEsbTGETNkrMX4mT6h8CfsqbPpwW:+ZaiKFnQoWTxglb83Yi3iPmbLDC

Malware Config

Extracted

Family

remcos

Botnet

nuevo5

C2

1octubre2024.con-ip.com:1510

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    registros.dat

  • keylog_flag

    false

  • keylog_folder

    nuevo5

  • mouse_option

    false

  • mutex

    oplkueyojnasuirowqyimcnnvjhfs-QWYDDX

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Capturas de pantalla

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      ee1e59674071a1c4541fbaf6f6f582cc.exe

    • Size

      379KB

    • MD5

      ee1e59674071a1c4541fbaf6f6f582cc

    • SHA1

      f1b3689389c286197e297a903942d20d3527d2c0

    • SHA256

      e6142fe26f2b69d6a0c29383eda5ba3ea883d706aa86f406a79668a346907d34

    • SHA512

      dd3d6dc531b453da6b583da7e0ec40b2f25ebe541ae0a0189d07be4a95491e1d6174c3b2cc9cf97d7fa773991b1fc4b4335e1cc9fa305c6c253fd451474e7e5e

    • SSDEEP

      384:zYfZf7DceK5eDKe5Teuek41UQFn0FWkorqVsiEsbTGETNkrMX4mT6h8CfsqbPpwW:+ZaiKFnQoWTxglb83Yi3iPmbLDC

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks