Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    Customers_Technical_2D_Drawing-IMG.bat.exe

  • Size

    1004KB

  • Sample

    241114-hlxtqawbjl

  • MD5

    b55d24e6b8e053c08bdd57534af83734

  • SHA1

    13473f286428aa39869a9580c7f3fbb0fde8d9ed

  • SHA256

    27e9d8399b11830c69e45b1d2f37dbde869ff3ec1185ea640c209399fb1d737b

  • SHA512

    1957bdfa97e1bd9309040f64d22c7348df0ca692f79a3136cb0203e19e5e4a67c5d8588e758f3e43a0652158a22042bd694635f0baaaa31c8d1c826432da8f22

  • SSDEEP

    24576:99CJVyR2dzExjVlDjcFXcq5meyUBNrllwKkwa9:9UO2dCzmeeT/sS

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

87.120.120.25:5940

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-13MD3U

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      Customers_Technical_2D_Drawing-IMG.bat.exe

    • Size

      1004KB

    • MD5

      b55d24e6b8e053c08bdd57534af83734

    • SHA1

      13473f286428aa39869a9580c7f3fbb0fde8d9ed

    • SHA256

      27e9d8399b11830c69e45b1d2f37dbde869ff3ec1185ea640c209399fb1d737b

    • SHA512

      1957bdfa97e1bd9309040f64d22c7348df0ca692f79a3136cb0203e19e5e4a67c5d8588e758f3e43a0652158a22042bd694635f0baaaa31c8d1c826432da8f22

    • SSDEEP

      24576:99CJVyR2dzExjVlDjcFXcq5meyUBNrllwKkwa9:9UO2dCzmeeT/sS

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.