General

  • Target

    Rooming list.js

  • Size

    12KB

  • Sample

    241125-sdvz9symfk

  • MD5

    caccefcdbbbfa170f1a4e378067649b1

  • SHA1

    2172ccb823996a86c57a098f2d4f65b38b872b03

  • SHA256

    d3fe61fd251583eae70dbc5ba508d0c30dda84d29be4d9449c038f8254ac9750

  • SHA512

    79fffd9df65c359350d7f54f60713418cdbd03effff0102ecd78ac796e741c4df5dd85488cce7047728e30423106bcfff5da4e47bdd49a77a06636d08edefa10

  • SSDEEP

    192:BQTkZ5u8Y1uj9DfT8Yt6LYVta9fX0l8ftHjymwLHmiDGSwKN4PzFwlIjpNLLdAqo:VzFQTLlbftHjsLHmiDGSwKKhLL/KQQz

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://paste.ee/d/7cWsL/0

exe.dropper

https://paste.ee/d/7cWsL/0

Extracted

Family

remcos

Botnet

Another

C2

closen.kozow.com:2404

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-7TC8FJ

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      Rooming list.js

    • Size

      12KB

    • MD5

      caccefcdbbbfa170f1a4e378067649b1

    • SHA1

      2172ccb823996a86c57a098f2d4f65b38b872b03

    • SHA256

      d3fe61fd251583eae70dbc5ba508d0c30dda84d29be4d9449c038f8254ac9750

    • SHA512

      79fffd9df65c359350d7f54f60713418cdbd03effff0102ecd78ac796e741c4df5dd85488cce7047728e30423106bcfff5da4e47bdd49a77a06636d08edefa10

    • SSDEEP

      192:BQTkZ5u8Y1uj9DfT8Yt6LYVta9fX0l8ftHjymwLHmiDGSwKN4PzFwlIjpNLLdAqo:VzFQTLlbftHjsLHmiDGSwKKhLL/KQQz

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook accounts

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks