General

  • Target

    522270d9091ce36ad2687b1c5398ddb2c93cb51178bc3db5d22bbd7d8571647b.exe

  • Size

    520KB

  • Sample

    241119-pp2emswhkm

  • MD5

    23ee9bf365c74322d4acb7e13290cf02

  • SHA1

    1036462903b8fec128e34a85ef4d8c6aa7e6eb73

  • SHA256

    522270d9091ce36ad2687b1c5398ddb2c93cb51178bc3db5d22bbd7d8571647b

  • SHA512

    c2532791a66b725ed70013decc1c5b6afdc7965b95d15adfd3540d56406648c826e31cb6995fab983a5e26c135129ebb015b2178bed3d290d2d95e7bc83e4969

  • SSDEEP

    12288:HStunmMTbnWa/SfKOu+25qopEUvnOqtSni7VE01u8yInDF6qfLV:S0mMTbnWa/SfCR5qopE6nO8Fq01u8jPh

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

212.162.149.42:7118

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-YP127Q

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      522270d9091ce36ad2687b1c5398ddb2c93cb51178bc3db5d22bbd7d8571647b.exe

    • Size

      520KB

    • MD5

      23ee9bf365c74322d4acb7e13290cf02

    • SHA1

      1036462903b8fec128e34a85ef4d8c6aa7e6eb73

    • SHA256

      522270d9091ce36ad2687b1c5398ddb2c93cb51178bc3db5d22bbd7d8571647b

    • SHA512

      c2532791a66b725ed70013decc1c5b6afdc7965b95d15adfd3540d56406648c826e31cb6995fab983a5e26c135129ebb015b2178bed3d290d2d95e7bc83e4969

    • SSDEEP

      12288:HStunmMTbnWa/SfKOu+25qopEUvnOqtSni7VE01u8yInDF6qfLV:S0mMTbnWa/SfCR5qopE6nO8Fq01u8jPh

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks