General

  • Target

    yiivdk.exe

  • Size

    1.3MB

  • Sample

    241203-nvf58atnds

  • MD5

    22ee58313edbd477e6a1ed76a1f9218f

  • SHA1

    f22e39af8b06e1c471138c820e59bb2abcb15a01

  • SHA256

    b54acfe94e3126a7a74935f4482e36513b3e6933af09a69a15dba8a7f4db4458

  • SHA512

    12c5ccb66a32a666c2a375ca74d02b10e19b872087738739d58d43c81dd00685b3731888e5b375b398a381e7aa82c25066fff430850caa38a9af5736833ffa01

  • SSDEEP

    24576:C2YbBZNbCLvA8pHmGguYNBcR80G9Ps6IZWtu7vSvmgJC9KicB7yd:C2YbBZNuDtm1uKBE80G9bIYtu7qmgJCQ

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

41.216.183.218:56792

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-I5RS8V

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      yiivdk.exe

    • Size

      1.3MB

    • MD5

      22ee58313edbd477e6a1ed76a1f9218f

    • SHA1

      f22e39af8b06e1c471138c820e59bb2abcb15a01

    • SHA256

      b54acfe94e3126a7a74935f4482e36513b3e6933af09a69a15dba8a7f4db4458

    • SHA512

      12c5ccb66a32a666c2a375ca74d02b10e19b872087738739d58d43c81dd00685b3731888e5b375b398a381e7aa82c25066fff430850caa38a9af5736833ffa01

    • SSDEEP

      24576:C2YbBZNbCLvA8pHmGguYNBcR80G9Ps6IZWtu7vSvmgJC9KicB7yd:C2YbBZNuDtm1uKBE80G9bIYtu7qmgJCQ

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks