General

  • Target

    MMtool.rar

  • Size

    9.2MB

  • Sample

    241023-n87v4a1cnm

  • MD5

    9480fa97a737546b98afe7c06f98163f

  • SHA1

    36655e4a541884812a1139a82d8fc763b61b4a7e

  • SHA256

    88e7ae386de2cde37847d86b59cee4e70d8d52186678535287f3b6e78de2577a

  • SHA512

    41b4bbfd5d1faffc73c47ff13b454b393821a11ba0624842de8784f715a83fc354bb5f1f5e73b4353f75e9d33296247e5863eb9bff77d1cd249e974e2fc2e127

  • SSDEEP

    196608:iceKRF9bIFZunjQ3aQEWO79YkLBjdZzp6vF84Q7NeUXSOmjB:icNFNS3BI9vnl6vFe3wB

Malware Config

Extracted

Family

remcos

Botnet

5000

C2

92.255.85.63:5000

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-WO26TT

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      MMtool/mm_aptio_tool_v5.0.exe

    • Size

      3.0MB

    • MD5

      ff950ee78e5673004b9ddcb5450f1f20

    • SHA1

      07feb57f5116d3381d6105ef3ecde9a0e6b8a298

    • SHA256

      ef2b84c9d41c153c31391a9a19721ee3ddba764e03aa2533875ce9d2016e4b55

    • SHA512

      66be3331519e0e541fe82490e48e148f2e6d32b59ed7e5bab1a04ecf60fb3111b82fb36551a0c54a6fc30afa2a683c8778bcb7a2b43a10247ef6ffe646bd5752

    • SSDEEP

      49152:MWGtLBcXqFpBR6SVb8kq4pgquLMMji4NYxtJpkxhGjIHTbx333Yq:ItLutqgwh4NYxtJpkxhGG333h

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks