General

  • Target

    84d5e09f1dec559db8fe63f3f9f9d2fab52963d9aba8d0f590d266fb7da6b30d.exe

  • Size

    1.2MB

  • Sample

    241112-c3x8xsshnm

  • MD5

    c8bc49ed133c2b4040fb1b9aca585fd6

  • SHA1

    f646a168db0c6cb3ee2949c2d0770a82dbef4b6d

  • SHA256

    84d5e09f1dec559db8fe63f3f9f9d2fab52963d9aba8d0f590d266fb7da6b30d

  • SHA512

    d8c4a9efbd31e45443d96b00dd9364100e69fd930a7b86f89da0c782a013521827be1fa59a587f6915f5e15bbba8c84a5fd9fa57de247a5b0ef4513683da1a20

  • SSDEEP

    12288:kdchmgIbgIOgLo24WLXAgQRul9McfhyFGTa4/aCU23oOS9G6CAKYo:kdMggZgLo24aaR9cfhyFGaw6CAe

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

204.10.160.239:9682

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-6D4L9S

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      84d5e09f1dec559db8fe63f3f9f9d2fab52963d9aba8d0f590d266fb7da6b30d.exe

    • Size

      1.2MB

    • MD5

      c8bc49ed133c2b4040fb1b9aca585fd6

    • SHA1

      f646a168db0c6cb3ee2949c2d0770a82dbef4b6d

    • SHA256

      84d5e09f1dec559db8fe63f3f9f9d2fab52963d9aba8d0f590d266fb7da6b30d

    • SHA512

      d8c4a9efbd31e45443d96b00dd9364100e69fd930a7b86f89da0c782a013521827be1fa59a587f6915f5e15bbba8c84a5fd9fa57de247a5b0ef4513683da1a20

    • SSDEEP

      12288:kdchmgIbgIOgLo24WLXAgQRul9McfhyFGTa4/aCU23oOS9G6CAKYo:kdMggZgLo24aaR9cfhyFGaw6CAe

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks