Analysis

  • max time kernel
    118s
  • max time network
    115s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    06/10/2024, 11:50 UTC

General

  • Target

    f562d2ed0a866465736e756247c609795130c49f296659f338e43ed13c5eac3fN.exe

  • Size

    811KB

  • MD5

    c03e260ac26dd90d10baaf0bb3975400

  • SHA1

    c137d2c639b64fd4e4d5dcb03b62ff5d81d3025d

  • SHA256

    f562d2ed0a866465736e756247c609795130c49f296659f338e43ed13c5eac3f

  • SHA512

    b4721b2dae920aed9e4f2edcee638ba1d639144ab630fd3455810ef33a5c312e8ace7f46b8e048c8d231f0dcbd7851d06621035677140f0d3ad5161e0d3d74f0

  • SSDEEP

    12288:a2hsDv8k1J5hS7KUiMFNSh5HrOjeJtghvihfA4TsAqZHrFWn/5er0XuweTv:a24kIsFNArOa/gsJAbrQerxweT

Malware Config

Extracted

Family

remcos

Botnet

octubre

C2

7458remc.duckdns.org:7548

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-QN8FUF

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Uses the VBS compiler for execution 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f562d2ed0a866465736e756247c609795130c49f296659f338e43ed13c5eac3fN.exe
    "C:\Users\Admin\AppData\Local\Temp\f562d2ed0a866465736e756247c609795130c49f296659f338e43ed13c5eac3fN.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1820
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2256

Network

  • flag-us
    DNS
    7458remc.duckdns.org
    vbc.exe
    Remote address:
    8.8.8.8:53
    Request
    7458remc.duckdns.org
    IN A
    Response
    7458remc.duckdns.org
    IN A
    46.246.86.16
  • flag-us
    DNS
    7458remc.duckdns.org
    vbc.exe
    Remote address:
    8.8.8.8:53
    Request
    7458remc.duckdns.org
    IN A
    Response
    7458remc.duckdns.org
    IN A
    46.246.86.16
  • 46.246.86.16:7548
    7458remc.duckdns.org
    vbc.exe
    152 B
    3
  • 46.246.86.16:7548
    7458remc.duckdns.org
    vbc.exe
    152 B
    3
  • 46.246.86.16:7548
    7458remc.duckdns.org
    vbc.exe
    152 B
    3
  • 46.246.86.16:7548
    7458remc.duckdns.org
    vbc.exe
    152 B
    3
  • 46.246.86.16:7548
    7458remc.duckdns.org
    vbc.exe
    152 B
    3
  • 46.246.86.16:7548
    7458remc.duckdns.org
    vbc.exe
    104 B
    2
  • 8.8.8.8:53
    7458remc.duckdns.org
    dns
    vbc.exe
    66 B
    82 B
    1
    1

    DNS Request

    7458remc.duckdns.org

    DNS Response

    46.246.86.16

  • 8.8.8.8:53
    7458remc.duckdns.org
    dns
    vbc.exe
    66 B
    82 B
    1
    1

    DNS Request

    7458remc.duckdns.org

    DNS Response

    46.246.86.16

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\remcos\logs.dat

    Filesize

    144B

    MD5

    103dcb0239c86d70007bc3cb7143c21c

    SHA1

    7b211a825a45d046f06a02bb6d623e20a1cc3d28

    SHA256

    daaecd63332d9beb847edc67ce5a2a3def9ceb23e1a3459addef592731ac489d

    SHA512

    8a8c412f198432555c45d7b4389cadcac002a487b341298b93a2bc473fa8a83155b87589fff3e6070ea42641f01b3af795fb053d65e397f90fb96cecd7af8b47

  • memory/1820-0-0x00000000746EE000-0x00000000746EF000-memory.dmp

    Filesize

    4KB

  • memory/1820-1-0x00000000001F0000-0x00000000002C0000-memory.dmp

    Filesize

    832KB

  • memory/1820-2-0x00000000746E0000-0x0000000074DCE000-memory.dmp

    Filesize

    6.9MB

  • memory/1820-18-0x00000000746E0000-0x0000000074DCE000-memory.dmp

    Filesize

    6.9MB

  • memory/2256-8-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2256-24-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2256-17-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2256-15-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2256-14-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2256-13-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2256-12-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2256-11-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2256-10-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2256-19-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2256-7-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2256-5-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2256-22-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2256-23-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2256-27-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2256-30-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2256-31-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2256-3-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2256-36-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2256-37-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2256-43-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2256-44-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2256-49-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2256-50-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2256-55-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2256-57-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.