General

  • Target

    465b3ea1a625728238b4d832b54b6fdc9321bd638ebd483ebecf2b8e32c322e0

  • Size

    1.9MB

  • Sample

    241107-z5wjfayere

  • MD5

    910327e1694532d09255bd8873c2265b

  • SHA1

    d8ff879532a00a57eacd8d54cce38653b515d861

  • SHA256

    465b3ea1a625728238b4d832b54b6fdc9321bd638ebd483ebecf2b8e32c322e0

  • SHA512

    680e0dd725dfa2a5ab6ce508567f10a7bf4779c662c0dfb83db4077df83b0b5c132f41cbb3c68efa00077bcaf71ce1ab648301d3da97b406d76ceee9c5bd7d4c

  • SSDEEP

    49152:Jswg4gfCUU/mW7Mi8Q1ogJ2U91vwmlRbQhfAu7RPq:ewg4gfc/m9inJy8RbQCu7RP

Malware Config

Extracted

Family

remcos

Botnet

ms-office

C2

ms-office.duckdns.org:39438

ms-office1.duckdns.org:39439

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-MXJN22

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      465b3ea1a625728238b4d832b54b6fdc9321bd638ebd483ebecf2b8e32c322e0

    • Size

      1.9MB

    • MD5

      910327e1694532d09255bd8873c2265b

    • SHA1

      d8ff879532a00a57eacd8d54cce38653b515d861

    • SHA256

      465b3ea1a625728238b4d832b54b6fdc9321bd638ebd483ebecf2b8e32c322e0

    • SHA512

      680e0dd725dfa2a5ab6ce508567f10a7bf4779c662c0dfb83db4077df83b0b5c132f41cbb3c68efa00077bcaf71ce1ab648301d3da97b406d76ceee9c5bd7d4c

    • SSDEEP

      49152:Jswg4gfCUU/mW7Mi8Q1ogJ2U91vwmlRbQhfAu7RPq:ewg4gfc/m9inJy8RbQCu7RP

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • Hawkeye family

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks