Resubmissions

24-11-2024 05:19

241124-fz37jssjhr 10

24-11-2024 05:13

241124-fwxklawje1 10

General

  • Target

    bo.exe

  • Size

    19.4MB

  • Sample

    241124-fz37jssjhr

  • MD5

    d11df1a50d4bd2946f22579a59c42533

  • SHA1

    642658e79c5efcfdf1ece6b24f677868e2e5242b

  • SHA256

    c284436ac848ee2ff093e35b1b1a3b75e137adff13c2d3cb070192cd3851bfcd

  • SHA512

    0dbe240d77a2e51198e942f0b48dc92f2d3c40f7eac98f957ede80f5809d4efff24a62f7f10e826b70b1459842391a880c39ab651b53809d4a0451778a04fb66

  • SSDEEP

    393216:V7HMp6xoUGEbCqiYXygxbisWLvhVARbpQgz+exD9ydNwbOVJs:VzMUWUxCD2nZi9vhVAx1+UDAvwbOw

Malware Config

Extracted

Family

remcos

Botnet

test

C2

185.25.205.221:2404

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    font.exe

  • copy_folder

    9910

  • delete_file

    false

  • hide_file

    true

  • hide_keylog_file

    true

  • install_flag

    true

  • install_path

    %WinDir%\System32

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-XVWSQS

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

31.57.135.113:4199

Mutex

w5g64wefd5w4ef

Attributes
  • delay

    1

  • install

    true

  • install_file

    dllhost.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      bo.exe

    • Size

      19.4MB

    • MD5

      d11df1a50d4bd2946f22579a59c42533

    • SHA1

      642658e79c5efcfdf1ece6b24f677868e2e5242b

    • SHA256

      c284436ac848ee2ff093e35b1b1a3b75e137adff13c2d3cb070192cd3851bfcd

    • SHA512

      0dbe240d77a2e51198e942f0b48dc92f2d3c40f7eac98f957ede80f5809d4efff24a62f7f10e826b70b1459842391a880c39ab651b53809d4a0451778a04fb66

    • SSDEEP

      393216:V7HMp6xoUGEbCqiYXygxbisWLvhVARbpQgz+exD9ydNwbOVJs:VzMUWUxCD2nZi9vhVAx1+UDAvwbOw

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • Async RAT payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks