General

  • Target

    d182015a22deb2189b6ded9bcbfce3e124cffe283b7710c44c9c4ac307183a14

  • Size

    8KB

  • Sample

    241125-dh4ewa1kbl

  • MD5

    ce64391e35804b8f508b5dfc7851a8b8

  • SHA1

    cd7e4c87dea93c48d875ecde504bd9e26bda93f3

  • SHA256

    d182015a22deb2189b6ded9bcbfce3e124cffe283b7710c44c9c4ac307183a14

  • SHA512

    fa9b5a53de7cf8544adc4d14bf1131ce009f617a9fbbdcf31ba5dbd65a37bf6dfbfcac177ebf3301a24222a95f385ac4850e05896df6d12a9b5b5517bd1ce38c

  • SSDEEP

    192:tB90IfuNEmEEKOM2jhmc4W6AR+GPb2ZH8o/ZvX2p+z8lDReMgA:tvJWIEXhMAbPaJ8o/0A4l8MgA

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

5nd42h78s.duckdns.org:3782

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-J5NDOL

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      202411_257658·pdf.vbs

    • Size

      16KB

    • MD5

      8fae2dd7ad6f5216e37266fa35a2e6c2

    • SHA1

      a7fe9d4ee1d837f7092060ba6f17d99747f8a695

    • SHA256

      8ad7d114db6254a352121ff777a4ddd8da8942d905967271a9dbbc45a027bdcb

    • SHA512

      a66aeda15f3ffdeb6b5c8550c6ea83478a422377565ee46d61ead44a6b0bcd6fa03e624b39753214baca150e2e0fdb6f44af091b9bbe5a276f76409c3b724981

    • SSDEEP

      384:HUViroQ8TyG/RgtLF6p3ezAgYJcaIWkPF:CikzgLeezAguca+

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • UAC bypass

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Blocklisted process makes network request

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks