General
-
Target
abfb205a822213514d6f37c6266f8ae2af77a0a9a69a265385415d8f1f5dd094
-
Size
469KB
-
Sample
241111-cmz3ks1apa
-
MD5
2f87f7406557caef3281973e21c65f16
-
SHA1
97357c5fa181b36a765fecd9391e83a9cef90d2f
-
SHA256
abfb205a822213514d6f37c6266f8ae2af77a0a9a69a265385415d8f1f5dd094
-
SHA512
0fe264ec1acef16e2886ed5ab4c6818ceb1c5dccbabcb35d33af37328fd9e40b4c146358dde6e29e38b91a0f872b74a01d19381596e2ff528f3786b0519a95c0
-
SSDEEP
12288:umnk7iLJbpIpiRL6I2WhSKQ9ZsfZQSfn9:WiLJbpI7I2WhQqZ7f9
Behavioral task
behavioral1
Sample
abfb205a822213514d6f37c6266f8ae2af77a0a9a69a265385415d8f1f5dd094.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
abfb205a822213514d6f37c6266f8ae2af77a0a9a69a265385415d8f1f5dd094.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
remcos
RemoteHost
planning-promised.gl.at.ply.gg:37721
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
file.exe
-
copy_folder
system64
-
delete_file
true
-
hide_file
true
-
hide_keylog_file
false
-
install_flag
true
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-B17O4C
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Security Backup
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
abfb205a822213514d6f37c6266f8ae2af77a0a9a69a265385415d8f1f5dd094
-
Size
469KB
-
MD5
2f87f7406557caef3281973e21c65f16
-
SHA1
97357c5fa181b36a765fecd9391e83a9cef90d2f
-
SHA256
abfb205a822213514d6f37c6266f8ae2af77a0a9a69a265385415d8f1f5dd094
-
SHA512
0fe264ec1acef16e2886ed5ab4c6818ceb1c5dccbabcb35d33af37328fd9e40b4c146358dde6e29e38b91a0f872b74a01d19381596e2ff528f3786b0519a95c0
-
SSDEEP
12288:umnk7iLJbpIpiRL6I2WhSKQ9ZsfZQSfn9:WiLJbpI7I2WhQqZ7f9
-
Remcos family
-
Adds policy Run key to start application
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
4