General

  • Target

    3299af172e776e5df6405662ac37f436fa49d0a41a95f8cda3f24006d78743ed

  • Size

    1.3MB

  • Sample

    241008-tpn7javbmp

  • MD5

    c0c8338e55e9a96b6bc9551189a93997

  • SHA1

    b658c6b88a9932916542fcbb253ff0b19223cecd

  • SHA256

    3299af172e776e5df6405662ac37f436fa49d0a41a95f8cda3f24006d78743ed

  • SHA512

    b446fdef6abf9ff781221404cefdb4894fdbfeb3fe37e91691980a0493b83677c3f3877d54fb24e87e7b4b7b07e62906b8be212cfcaded70abcdabd1eaceac8e

  • SSDEEP

    24576:kBbK9XvkSSY4t3nrJEVaB7PekqIOLUS9zuy2WUEKmpwg:k89fAY4Fri27Pe6+LPtGmB

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost1

C2

tochisglobal.ddnsking.com:6426

tochisglobal.ddns.net:6426

backups1122.duckdns.org:6426

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    -KS7514

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      scan00093944.pdf.exe

    • Size

      1.6MB

    • MD5

      1a2e594a704d93994d0f361d24230eda

    • SHA1

      d7ce5cc39741222c2739081dd7171de223897b11

    • SHA256

      36336b168fdd5dcf5172b9f91137d58e8747c4c263b505f303255a91be62bafb

    • SHA512

      68929288d281743071dcec104e26f154a1520b895937954373427f01ff70f838e4a7c377b3dcfdbe94febf14560578d218339c06797a0cffce4e3ababfd9543a

    • SSDEEP

      24576:ffmMv6Ckr7Mny5QL13DTHOVaB7LekaKaLaU9fEkC2iSKyf+l:f3v+7/5QLZTuy7Le+aT95myW

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks