General

  • Target

    db6d71e880a06ada6f3b1a50b335fc2e59833d965d027211b2b642a8c2f3560d

  • Size

    45KB

  • Sample

    241112-bs3vzsvkaj

  • MD5

    0e929d6be5ee3aa22ae6e6b57322dda6

  • SHA1

    69d5a09f730db33065247e822122e836fec93efd

  • SHA256

    db6d71e880a06ada6f3b1a50b335fc2e59833d965d027211b2b642a8c2f3560d

  • SHA512

    c4b534f52ccda05334ecbcd8a0b37e7970fe7f88967fa5b46d3e9f35633ff6fb1e135ea37a78a4773935c06e01247033f86616aa3927b5199460014c1427f137

  • SSDEEP

    768:fUrwC/ceMuP9wi3aflwZmU9vZAsmWAmuYHKniurkL6D4mHPAQJ1aSncmFFd3JcXS:ZzeJ9RKflwZdZIWAMAYiPPVFhWXd6ao

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

13hindi4pistatukoy4tra.duckdns.org:47392

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-7IIE67

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      SK 견적요청_울산공장·pdf.vbs

    • Size

      86KB

    • MD5

      da79738f51b4a2f265c6817f2db04646

    • SHA1

      285cbcc5237b51baa7b93cc7cdae2ff4c08a4806

    • SHA256

      fcb85efd53de456d5f743a08f2585d7d54e1a891b7ef8cc768a4a85c9cd3d36d

    • SHA512

      aed649f3ae5f8ddf33918a3f8891b85aa1c723b52d04553fca3cf06792861f652dd1bc4b196427c224cbbc526c669d0286e1084a39bbb27bcbeaeee52bfe4667

    • SSDEEP

      1536:H70tD9v0kQmGd9pipuoNqCZJlnfsBovNFqq8kuX0NhMfYagy1VRXaAj27DsH4Dt:HQd9vhrU9k5mBov98iNhMfYapVRQDsH+

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • UAC bypass

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Blocklisted process makes network request

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook accounts

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Legitimate hosting services abused for malware hosting/C2

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks