General

  • Target

    c51201337af75df4850b5392117e54eedfa2f1ac133e891947ece8102cdda0d0.exe

  • Size

    951KB

  • Sample

    241126-ylgqhawqgw

  • MD5

    cdb36d7e12b4b09cc17a4acb15abcb32

  • SHA1

    22bac6bed40f58042c26c64f27fa6d1ba62bdf8b

  • SHA256

    c51201337af75df4850b5392117e54eedfa2f1ac133e891947ece8102cdda0d0

  • SHA512

    2cdb43718de629e69a93e1ac138747d2550bf2a1a56bc265c19837171067d843a4aed83b6c95d04488b15cbd2a80b07c9f4412e5b787507575e09d333912b909

  • SSDEEP

    12288:/CfiaKJpEBPqhqZELFu0Hy52/aSMlon8NyPtGKN5VV2WJ9oaTXJmBupazmbME:/YitEsFS5+aSmoeyVG+V90OkswzSp

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

104.250.180.178:7902

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    Adobe.exe

  • copy_folder

    Adobe

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    true

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Adobe-OTOIRK

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      c51201337af75df4850b5392117e54eedfa2f1ac133e891947ece8102cdda0d0.exe

    • Size

      951KB

    • MD5

      cdb36d7e12b4b09cc17a4acb15abcb32

    • SHA1

      22bac6bed40f58042c26c64f27fa6d1ba62bdf8b

    • SHA256

      c51201337af75df4850b5392117e54eedfa2f1ac133e891947ece8102cdda0d0

    • SHA512

      2cdb43718de629e69a93e1ac138747d2550bf2a1a56bc265c19837171067d843a4aed83b6c95d04488b15cbd2a80b07c9f4412e5b787507575e09d333912b909

    • SSDEEP

      12288:/CfiaKJpEBPqhqZELFu0Hy52/aSMlon8NyPtGKN5VV2WJ9oaTXJmBupazmbME:/YitEsFS5+aSmoeyVG+V90OkswzSp

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks