General

  • Target

    shell.dll

  • Size

    465KB

  • Sample

    241109-q8k3fawark

  • MD5

    11e5f15e25d2800e1d69940e337728aa

  • SHA1

    cd075a868575a5dceb06bbacd63f6bb8a5550a79

  • SHA256

    411ee83741fef5659ccec7b2458059cd87efc44409e9d4eb569916ded6c4a5a1

  • SHA512

    d33615b47a1e7e7292de1ae30be58da1dc8eedbce0cea669e47b82da787495ff91355e393db0648367560e8ed7f43189320badb33464c1fed0a1e15875260112

  • SSDEEP

    12288:APZmBcv4pc/FIz46LEM3b3dEeDCEjqT+PZmp4:Ahmqec/b65r0EEAZ

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

194.59.31.143:4444

Attributes
  • audio_folder

    xboxGameBar

  • audio_path

    %SystemDrive%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    ploi.exe

  • copy_folder

    koi

  • delete_file

    true

  • hide_file

    true

  • hide_keylog_file

    false

  • install_flag

    false

  • install_path

    %SystemDrive%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-VDAG8R

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      shell.dll

    • Size

      465KB

    • MD5

      11e5f15e25d2800e1d69940e337728aa

    • SHA1

      cd075a868575a5dceb06bbacd63f6bb8a5550a79

    • SHA256

      411ee83741fef5659ccec7b2458059cd87efc44409e9d4eb569916ded6c4a5a1

    • SHA512

      d33615b47a1e7e7292de1ae30be58da1dc8eedbce0cea669e47b82da787495ff91355e393db0648367560e8ed7f43189320badb33464c1fed0a1e15875260112

    • SSDEEP

      12288:APZmBcv4pc/FIz46LEM3b3dEeDCEjqT+PZmp4:Ahmqec/b65r0EEAZ

    • UAC bypass

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks