General

  • Target

    remcos_a.exe

  • Size

    469KB

  • Sample

    241018-tltylswbrb

  • MD5

    04a1c15b1c4997aa7330ec2a2db7ea6c

  • SHA1

    66818bc414329e57bd8952e1d958abc0c3499436

  • SHA256

    52d96d5bcefcb3fc8fb937370e843aa4b2647adea1f236cd65ee4de1d199c119

  • SHA512

    251ed575705bb5afcbfd326d9302d53bf0f9d67a5474cd36b55a5dbc823a529e1be4f60f78b96441bd79220cc028286d7aeb4d8deac18a4a2a5f4953730ba1aa

  • SSDEEP

    12288:Wmnk7iLJbpIpiRL6I2WhSKQ9ZsfZQS3n9:uiLJbpI7I2WhQqZ739

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

electronic-matched.gl.at.ply.gg:5061

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    $77-start.exe

  • copy_folder

    files

  • delete_file

    true

  • hide_file

    true

  • hide_keylog_file

    false

  • install_flag

    true

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-ZUW89Z

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      remcos_a.exe

    • Size

      469KB

    • MD5

      04a1c15b1c4997aa7330ec2a2db7ea6c

    • SHA1

      66818bc414329e57bd8952e1d958abc0c3499436

    • SHA256

      52d96d5bcefcb3fc8fb937370e843aa4b2647adea1f236cd65ee4de1d199c119

    • SHA512

      251ed575705bb5afcbfd326d9302d53bf0f9d67a5474cd36b55a5dbc823a529e1be4f60f78b96441bd79220cc028286d7aeb4d8deac18a4a2a5f4953730ba1aa

    • SSDEEP

      12288:Wmnk7iLJbpIpiRL6I2WhSKQ9ZsfZQS3n9:uiLJbpI7I2WhQqZ739

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • UAC bypass

    • Adds policy Run key to start application

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Indicator Removal: Clear Windows Event Logs

      Clear Windows Event Logs to hide the activity of an intrusion.

    • Adds Run key to start application

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks