General

  • Target

    af5bde79a81f40f3f422fc951e9e02e17306157a0e9f109a0c7e4c8c70668c7a

  • Size

    1002KB

  • Sample

    241121-fmmzsstldr

  • MD5

    bfa32c901bdbc671b281afa06c7c0991

  • SHA1

    049ca7c6d67847d63883f4937d22f678a4d43d55

  • SHA256

    af5bde79a81f40f3f422fc951e9e02e17306157a0e9f109a0c7e4c8c70668c7a

  • SHA512

    9a8fe8fc84a888b31e2a6bfcbf57f50b94945c3721d827de3c4f06c4442d675b7540fe0702caa567a9c85efc752aca591067584c79a945801e34f1b617c60e4b

  • SSDEEP

    24576:/x+ZSn1iLZFVWR4bn/bIop/RN3eGY+YYz3smv:/zn0Wgn/bIo1jeG1Smv

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

154.216.16.54:6092

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    true

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-YJ70D0

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    true

  • take_screenshot_time

    5

Targets

    • Target

      RFQ.exe

    • Size

      1.4MB

    • MD5

      a88b0ddc1c80b37e8af7ca017929bf88

    • SHA1

      601ae4b9be7c6619680d6ac19e4dae3acb572464

    • SHA256

      9b6c97ad4d3d563b1bf7330e0aef16649514a1e0ac422bf99368bbb5a0069c4c

    • SHA512

      a776e6d0db9c16ed2b2ce90ed06f3cdc4101e05399503c201a8c409a3d4b8b846d7a6dce5ca634199946962a6655788b7d6bed44509e76bd69a7590c3dbbe927

    • SSDEEP

      24576:ozsSzxWeyf1eLZajkRqxnTf/7UeCL4EryZNK0P+:ozsUW5fJkUnTfDUe04Ee7bW

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks