General

  • Target

    8366f77c935b2e69de39caac11507cc0ad2ac8eba6ebd70fa04c65b99b19225f

  • Size

    1.4MB

  • Sample

    241112-chvbjasdll

  • MD5

    f9bef83f75870b44ef947e5d71ab229f

  • SHA1

    e93947c9f7209167c09f292430ab25ed06e75afd

  • SHA256

    8366f77c935b2e69de39caac11507cc0ad2ac8eba6ebd70fa04c65b99b19225f

  • SHA512

    b65851724317a291c2b52ab5856b8dc51a85f51358657ff4df27bb70238402177669ded0a699322a550dac7c403d06bd8519602e5189772eec802e28872706db

  • SSDEEP

    24576:JzFh6Ax5KkdYBl9fKMsIE25rHySpgb9ivdjd+gmqSTudy2sKZQbXcD6dKJeQSom6:RFh6MKkWtfKbT4jWivLjsKkdKD7m+R7

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

162.251.122.86:6644

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-CGA6IQ

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      PO -96778097 HHIC 137 IMO 9730086-HYU24111103-프로젝트 순서.exe

    • Size

      1.7MB

    • MD5

      4302ff3ce4d3f174a2a6f6b4d6bbef32

    • SHA1

      3039a7ebfc83cc920790ca4ee7d18a0b332437ed

    • SHA256

      8082ea9624bb02dd681c092c1fbddf363c145b8a633441dde6170e7eb151d8ef

    • SHA512

      228fe4cdd9f49da7830a4266737f7b16b666c08f3e01ab09a8e7934864d25142c2691e9360efced6787900693429970faa44b3c065104104101e3b9b792940fe

    • SSDEEP

      49152:7JZoQrbTFZY1iaCtkWTTglQ4v5Hs2ydsx/wwRW:7trbTA1ik7v5HDRW

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks