General

  • Target

    6e13fc43be80b7d70a78e5d768e87459d04d291fe229cf07f7aa5e6a55c64514

  • Size

    1.1MB

  • Sample

    241115-yq2w8svkdl

  • MD5

    349d2b2678590cbad8ddb01561fc3727

  • SHA1

    cec2304bd511a2f28955b8cdf90dc36111c6d9f1

  • SHA256

    6e13fc43be80b7d70a78e5d768e87459d04d291fe229cf07f7aa5e6a55c64514

  • SHA512

    7b25e9956a595a7c383bb4c1b4210b71de5a58a04c5a5d95fc746bb0b5ab1c2b20d91e1c72bad1be12949473a841b3ded50e48099b8c817edd3dca31d786a6b0

  • SSDEEP

    24576:m1kXnoZWsG1HFXWMt6HINqrs5JVG4vHab+cEGF/Z8qo:myXnhB0MsXs5/G4fIyh

Malware Config

Extracted

Family

remcos

Botnet

8654

C2

windowsocttehe.duckdns.org:45682

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    8454-HGPRQ6

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      6e13fc43be80b7d70a78e5d768e87459d04d291fe229cf07f7aa5e6a55c64514

    • Size

      1.1MB

    • MD5

      349d2b2678590cbad8ddb01561fc3727

    • SHA1

      cec2304bd511a2f28955b8cdf90dc36111c6d9f1

    • SHA256

      6e13fc43be80b7d70a78e5d768e87459d04d291fe229cf07f7aa5e6a55c64514

    • SHA512

      7b25e9956a595a7c383bb4c1b4210b71de5a58a04c5a5d95fc746bb0b5ab1c2b20d91e1c72bad1be12949473a841b3ded50e48099b8c817edd3dca31d786a6b0

    • SSDEEP

      24576:m1kXnoZWsG1HFXWMt6HINqrs5JVG4vHab+cEGF/Z8qo:myXnhB0MsXs5/G4fIyh

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks