General

  • Target

    13d4ae15927c0c9080b6d657e8850deb72ecd091ebc0b01d2ed75d4caa007bbe

  • Size

    864KB

  • Sample

    241113-fme9yszkgn

  • MD5

    c416e5671d3d82307a384859bd62741b

  • SHA1

    35eaf84fcba0c178547c0214784d02eb474c551a

  • SHA256

    13d4ae15927c0c9080b6d657e8850deb72ecd091ebc0b01d2ed75d4caa007bbe

  • SHA512

    ee71e7c78852e3777fc4563e7552fc094c9d066e19cf5a030f40c9c2e8e7fc3273d85555565fb0820b485175d66211b014010b35f3d34d9c1cc6384371975e92

  • SSDEEP

    24576:V9O53gsS+mfpjECkPrvNmWjDa0P+RPGaCD1Oj9:LO53pS+cREzzvNZj2XuaChOB

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

172.245.123.14:2404

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-3DXQCZ

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      shipment scheduled NOV 13-14TH.exe

    • Size

      920KB

    • MD5

      06cf3f0d14bcba73c87f66a821f7f4d4

    • SHA1

      bc56adb6065940a2e08bc43a027d9cfb396f642e

    • SHA256

      80e92b616e6ca40836434deeb64a032a13a2a441653b8fc4af29b075a864d3bc

    • SHA512

      2a97089579b0af02560abaebbc8b56b3c4babd9e85b92f07e2ec7fe4c4a4348bbec5214719484dd4ad8c39667c39a4b8b73596c9f2fc8fa32073862ae126a553

    • SSDEEP

      24576:hMyT7/osm++31jw2kvXvlMOj9k0T+6SXPGaDDm6UH:pT7/Bm+KNw3fvlljmCkuaD

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks