General

  • Target

    ddddd.vmp.exe

  • Size

    863KB

  • Sample

    241115-mryenawqbq

  • MD5

    4fc4b8ab66fb7a44509e1deecab3d29b

  • SHA1

    bec1a36c002293263696493cffc25ca62c24e0d2

  • SHA256

    c32d6e5170ab29fbfdd30e21944caace6ca4543bd9d07159aac2205d3077cbba

  • SHA512

    3be9cabb51a345fc174e41897d90b243ffcadb09bcd47d937194aaf0313c2ef1a32a9c02ffa1ea053574daf6ffd1981a6578c45f120b1a8fa212a5485fbfd307

  • SSDEEP

    24576:c5FnNeSFX4By2BY0Kqx0eyvlXFNtC5OMcQob:mRFX4By2mT/eyvlXFrCob

Malware Config

Extracted

Family

remcos

Botnet

svchost

C2

schedule-lambda.gl.at.ply.gg:52195

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    svchost.exe

  • copy_folder

    svchost

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    true

  • install_path

    %WinDir%\System32

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-UZHX9X

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Microsoft Systems inc.

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      ddddd.vmp.exe

    • Size

      863KB

    • MD5

      4fc4b8ab66fb7a44509e1deecab3d29b

    • SHA1

      bec1a36c002293263696493cffc25ca62c24e0d2

    • SHA256

      c32d6e5170ab29fbfdd30e21944caace6ca4543bd9d07159aac2205d3077cbba

    • SHA512

      3be9cabb51a345fc174e41897d90b243ffcadb09bcd47d937194aaf0313c2ef1a32a9c02ffa1ea053574daf6ffd1981a6578c45f120b1a8fa212a5485fbfd307

    • SSDEEP

      24576:c5FnNeSFX4By2BY0Kqx0eyvlXFNtC5OMcQob:mRFX4By2mT/eyvlXFrCob

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.