General

  • Target

    Image_Product_Inquiry_Request_Villoslada.img

  • Size

    762KB

  • Sample

    241108-ssaymsxkcl

  • MD5

    2c5af96c200eaf29a49747616e873516

  • SHA1

    c680278cfdb8908632a5506259fb6a2dc826b5a8

  • SHA256

    14783a055ffaf5ff5e003128975ba33ec37264319a4e282b45c2bde946444a6e

  • SHA512

    f26b29bd8b62f02adaa717d09db664b2697ecfeaef1f884bddd50c956e72467687eb1a9197e42cd8ec926052e3cc84e8d65c41109e973e811abcff8f62a2ac78

  • SSDEEP

    12288:sMwd9MAsZuwxTSesxl98vQJXQNqlSFQkuizwFFRNkpXmGzEk/in5IAvmtnRHPG62:sMwd9MAgSBP84JeqlSFQdimvkm2t/6kY

Malware Config

Extracted

Family

remcos

Botnet

eda bro

C2

185.150.191.117:4609

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-CK59IO

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      Image_Product_Inquiry_Request_Villoslada.exe

    • Size

      701KB

    • MD5

      74436e65e2a2612fb6a127990d81f44d

    • SHA1

      d3fb7c67c6441d908a91d6e6b86e38c85b47b877

    • SHA256

      3e6b2955e8e0ddd77f3886b9727ea7a38657d4f0af47130559a8cefe1c87ea97

    • SHA512

      bbd6102c6759d61cb701cf235e2bfea442cfd702ad9def2e4d5134259678ecc0f79488e66d9e7bdfa39ae621f25ed5c68ccc21a298ddb5df497bd72070c0d491

    • SSDEEP

      12288:4Mwd9MAsZuwxTSesxl98vQJXQNqlSFQkuizwFFRNkpXmGzEk/in5IAvmtnRHPG62:4Mwd9MAgSBP84JeqlSFQdimvkm2t/6kY

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Accesses Microsoft Outlook accounts

    • Blocklisted process makes network request

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • Target

      Militrattacheens/boliganvisning.app

    • Size

      424KB

    • MD5

      a254d81b4f25bc2b7d74ed5ac8ef3877

    • SHA1

      2098fcd61a958c772e7eedd5bb736deac2f0bd39

    • SHA256

      f45da7c81581e6c3f3211fb431a8259d2c05fa60635f4e1c764584467b71ebb4

    • SHA512

      5cb1f8672197da9cf3b4461cc470bdb0e3e4965eb6d3c7170168a4af3d00ec23a1474281766f790fcc6fc577fccf89971a5addec5c1f220f618c6887ec6607e3

    • SSDEEP

      1536:Y2dHtzRzGpErAfmh6tyfeCOfrCmf3XRWxYgT0Gcu:Y2tpGpEMfhwGj9xWmu

    Score
    4/10

MITRE ATT&CK Enterprise v15

Tasks