General

  • Target

    super duper ultimate robbery gang.zip

  • Size

    5.8MB

  • Sample

    241203-17kemaspcq

  • MD5

    2d0dcaa2ef56cd6d2fe9bd8c7f576471

  • SHA1

    13954dd3862e78b72f3abf8610ef5298bfc06abd

  • SHA256

    b22f7f97d15127377296e1115f8e8fba93e5d7acb17cbf3db258af6ccb9b6a79

  • SHA512

    0579202f7bb94b157ed873e1ac28c260321808ec22d5621c16fba5c05e09a3db61c10900d52a0fa15a588787c02dae362ae9cd234f3c2ff847c96aedade36aca

  • SSDEEP

    98304:U/2wGe6OWquScT7QdA0x5UnUWlpbPoGch9bjOBTiXmA+/CBmn82vEUX6e5exzonR:tLqpcT7QdxvULl9yhs9h/mp2ekexzoA0

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

Mutex

ZFt9dPZbK7Z1

Attributes
  • delay

    3

  • install

    true

  • install_file

    test.exe

  • install_folder

    %AppData%

aes.plain

Extracted

Family

darkcomet

Botnet

Guest16

C2

127.0.0.1:1604

Mutex

DC_MUTEX-83M2HE1

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    a41jikRrG7Ty

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Extracted

Family

darkcomet

Botnet

valorant

C2

127.0.0.1:1604

Mutex

DC_MUTEX-FV0KX58

Attributes
  • InstallPath

    Windows Gezgini/exploore.exe

  • gencode

    o2wpkDU8nSnV

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    google

Extracted

Family

remcos

Botnet

RemoteHost

C2

192.168.56.1:2404

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-7NRWI3

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Extracted

Family

remcos

Version

5.3.0 Light

Botnet

RemoteHost

C2

192.168.56.1:2404

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-7NRWI3

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      super duper ultimate robbery gang.zip

    • Size

      5.8MB

    • MD5

      2d0dcaa2ef56cd6d2fe9bd8c7f576471

    • SHA1

      13954dd3862e78b72f3abf8610ef5298bfc06abd

    • SHA256

      b22f7f97d15127377296e1115f8e8fba93e5d7acb17cbf3db258af6ccb9b6a79

    • SHA512

      0579202f7bb94b157ed873e1ac28c260321808ec22d5621c16fba5c05e09a3db61c10900d52a0fa15a588787c02dae362ae9cd234f3c2ff847c96aedade36aca

    • SSDEEP

      98304:U/2wGe6OWquScT7QdA0x5UnUWlpbPoGch9bjOBTiXmA+/CBmn82vEUX6e5exzonR:tLqpcT7QdxvULl9yhs9h/mp2ekexzoA0

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • Async RAT payload

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks