General

  • Target

    41cd4c6d20564199e2f90094edbacf4c2d0f8d1604ce8903e0c16b3ba1fdab21

  • Size

    2.6MB

  • Sample

    241015-brq5sszhqm

  • MD5

    017c6b9342ebfedcf48f78a988dd9469

  • SHA1

    9bd78de75054a6ac9b2a5ee80b6d7e9d95a3e527

  • SHA256

    41cd4c6d20564199e2f90094edbacf4c2d0f8d1604ce8903e0c16b3ba1fdab21

  • SHA512

    ad2878e123717f78ba77da7a6b054a4aafb087e16efe7986be3874e28ae69c93c6cd7da22564cefc28820c2fc0734f4ee5e9512b4b76a38ddc660a0a420ea0e7

  • SSDEEP

    49152:uE/4Svc/h5WP+ZcNOl009FGNqFGieeitEdATA88kRHKodJY/Y+M3OVFaZR:uEP9P7CtGUSxAYRHfdi/Y+M+VFk

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

204.10.160.212:6622

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-98KSNN

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      RFQ_23K038~41A-22-PO 00561~579-H2566~9.exe

    • Size

      3.0MB

    • MD5

      2e5cc2ed04be92b41c884429693bc8bd

    • SHA1

      163015557c5fc3258f988e4da0fcc668c230e19a

    • SHA256

      578449d310dfe30a1bec653337bd51f621ed1fc41e9bb5d1efe4646c3c8ec39e

    • SHA512

      670dff7c7467977ff0a08c417545c0661ded50ba6fec9c24f110d048b2cf2e9797135bb0d9466341ce9f9b6b6882f8db238518a0636681cb5a08885fc0792103

    • SSDEEP

      49152:T3v+7/5QyIeGth/6p+JchOb80NzEBqF080SE1CZAfMoUY/jeODxWHe+MxgVFaZ6:T3v+7plplirEE8NMW/j9DsHe+MiVF/

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks