General

  • Target

    4b1940d1d48da34c2bd0d60403181786.tar

  • Size

    15.2MB

  • Sample

    241114-w19zgs1lhy

  • MD5

    4b1940d1d48da34c2bd0d60403181786

  • SHA1

    78ddadb5453d7c53c27e344c81177272b43e84d8

  • SHA256

    e5203f6c2432034e7a18f9580294f5ca3276820f9c3d6dfdcada441c14784fc2

  • SHA512

    3c72c9867bec19f88a8d3e41249188e84d7e3462aef060f9e883266c101d95eae86999c2425366b06a54803a28c34662f063362f0c3db35dc44456d007b7d828

  • SSDEEP

    393216:7x8jDlChSbcoC8EnDpIiBsRdJihMHviBbpZ32:NgamdEnlIqs/fHKBNZ32

Malware Config

Extracted

Family

remcos

Botnet

DOLAR

C2

noviembre12.ydns.eu:2708

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-AZY5JK

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      3082-INSTANCIA No. 7590-2024..exe

    • Size

      15.3MB

    • MD5

      7c8b84ef9f4ddd9664444e41ab71e713

    • SHA1

      438ac22d66dcaf80b40742662ebec0d763798b94

    • SHA256

      7c0a151ef239e3c41940ed72090a25bb56cf4c6574893e17dab9067f54038993

    • SHA512

      6ae69dbaa14990ec8bd0a49fb994c4243e8a94bf0cb684c36cc3623bf7766e5c44e7fd8de7da65463a2584ac312dcee03bca0114daec265ecdaf81dbd97406d9

    • SSDEEP

      393216:c3LHzaNYYRs5r1/YVY6EynEoBruKzONBIud4KOaq90Y:c3LeNYYZSKnESFZKzqF

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Drops startup file

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks