General

  • Target

    Документи.zip

  • Size

    11KB

  • Sample

    241010-nrwfqsvdmg

  • MD5

    1b20b7aea59b6493ac5be562800667f5

  • SHA1

    9444fe6caec824e28add10b834561b1658f5e858

  • SHA256

    0c96359b10b505830decc2c11ed165479af4f89f46c0994428833100e5195cbc

  • SHA512

    ab690b554b25be706e77f30262498742435836fcb2a6aca4d2123d49825e4e3b86b477b658094cab7679ce76252ee7013ca83e8195428f43a2f4afe8a13b013c

  • SSDEEP

    192:PLylK9xnw7BD2NR1X0paH87XzJPH8STVE20K2mSyeQSrAtYk1qja:2Mjw7B67hYHBhEu2mSaqA+cR

Malware Config

Extracted

Family

remcos

Botnet

host_one

C2

101.99.94.69:2404

101.99.94.69:8090

101.99.94.69:44444

101.99.94.69:80

101.99.94.69:21

101.99.94.69:4899

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    rmc

  • mouse_option

    false

  • mutex

    Rmc-UP4CTA

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      Документи.bat

    • Size

      13KB

    • MD5

      4303710398af710fc8acfa7a732aafbd

    • SHA1

      42847713dd9c5313831656894505063c4949a018

    • SHA256

      0a2b1844b3ef7454a977db405d7b86cac2cf6e93cd09773db843290f1e9f0d97

    • SHA512

      d9d88afbfd28a3b0d422be566ba1113e8c21d3d82b32c611800536ef67eb0b9c06392b4d4413b8174b489be56ec0dd1e9ffadb991f197a0336fa1b3937c2001a

    • SSDEEP

      192:OqDZujXdVzn3qxkk5Eno3vvb17652yVjjG/tw+qNbgAcnjz9qjgZn5:ZsjtZnzxn0vb17MNu4B8jcEX

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • Suspicious use of SetThreadContext

    • Target

      Документи.vbs

    • Size

      15KB

    • MD5

      f38ba7aa784bb8bcc526ecd9c6953bed

    • SHA1

      f32b215e22d5a7728b2bc2be84f3697e33126f13

    • SHA256

      2837b1cfc87c988e5475f47e4c9f146eb4094e192eebc91c4171d62a60735cd3

    • SHA512

      729adffc803b7ec7c8202e731b81a9c79bdb361a59e9bc1d250e7831c801de6ea3e2b0ff3e0a6d8dadb3f5d406242d128273c473b3074ceb2096a52fbd9e5de8

    • SSDEEP

      192:sWZsOMqxnDxLInuYCWGHn5qg/tyZdG97qwYVLtGcGPJZMxu2hlYF9WBMDxpnO/9m:sBO9xLIuLWGHnD0QWVLQPJmxNSiMFpWm

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks