General

  • Target

    db70d3bc51ab841d791d58a97816b8542267e679fd37737236b95944eaac0643

  • Size

    812KB

  • Sample

    241129-ejzczstpfx

  • MD5

    6fc19d575e3e266a30905af3175d2006

  • SHA1

    eda92d7caead51a8801c1ca0ed880c0d7b7b7eef

  • SHA256

    db70d3bc51ab841d791d58a97816b8542267e679fd37737236b95944eaac0643

  • SHA512

    2e2ba55a31b5d500f8d379940c46d1a45ca326dee18443b67d77e4c6e7f11cbbef008ad685d3de0759d744bd42df881762a7d6946fb72549221d6b1296de2af4

  • SSDEEP

    24576:jY+Le87CtQoXwKn4wlPmT01yiAyLoIBq61mrvMGW1:jY+aEWAtCeTbiAyLoSpIMJ1

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

192.3.64.152:2559

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-ZFXG9Y

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      PO.exe

    • Size

      1.3MB

    • MD5

      5d15087ab767a84ec8e8805bb26eb8b8

    • SHA1

      01bba4ff864c053b3485b20cb4e60666be7355a7

    • SHA256

      6b509b581157e265d6e3d2bdeed463195464daeafe98b57cea4ef59141d21b62

    • SHA512

      dcc463497cfbe933de85999b6010382b82a449f827621f1f5215a9459696f80172e69019b8d1385d2fc3edfe0543035b73042cbab7d2b860c8e382d8fa9d5805

    • SSDEEP

      24576:ztb20pkaCqT5TBWgNQ7azerXt4yv6uaDWBq74Ws66A:wVg5tQ7azeryYA4OZj5

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks