General

  • Target

    04112024_0104_01112024_NLB.Banka.Plakanje.Pdf.img

  • Size

    260KB

  • Sample

    241104-bez7yaykhz

  • MD5

    9bf62391f6d8d16ab536ccfb5713f020

  • SHA1

    3946190013fd08de06811610a105a5420df96623

  • SHA256

    61000e17a1e3b76dc7f0408c129f749cf559a95d29dc00808c3126dcd1b79368

  • SHA512

    76cad5c6744c89acb3ed5c12a0f4c49a646650155a03aa48b7c058f30a6b4cbe8596502ef5bbea3b673b1a5da6263621f33b749d977a5280c347711d33a3b4da

  • SSDEEP

    6144:R+p5ULKAvyURfunFq6JYuJ8j3y+J3HcDCy9Pq:8gKg+F1Ju/8DCyV

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

204.10.160.230:8693

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-5CZLMD

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      NLB.Banka.Plakanje.Pdf.exe

    • Size

      209KB

    • MD5

      bc92ed0da556a068cbb4fe8b0eafe8d1

    • SHA1

      b78de0829e9f8d8a2abd9526dd8f98518a11691e

    • SHA256

      045d8fb2e36d1b5451e53e631b71a1c7f5366dd440b66547951d20f307f0249d

    • SHA512

      3135dab3a4eb38594a193407ce5b759cba2524beac2e5b37b6d98236743a43a227f3bd647667a95368256740fa5d486e6403f1e4dd751641dae0f8243c4b1801

    • SSDEEP

      6144:Q+p5ULKAvyURfunFq6JYuJ8j3y+J3HcDCy9Pq:jgKg+F1Ju/8DCyV

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks