General

  • Target

    04122024_1416_awb_shipping_documents_bl_inv_2024_12_04_000000000000000.cmd.zip

  • Size

    4KB

  • Sample

    241204-rk66faxqax

  • MD5

    e87c78bd5ff7420db2d0474f0e7b8f13

  • SHA1

    7059c136c8bcecf9b9a3b1acb11086242023bc25

  • SHA256

    caa4eddbc202ba6e4978e3c2c5991b886e675c91006148aa45e5ffba0605b155

  • SHA512

    7a0c3e7eadac54b1941645868ecca399ac93b5f442ea0e5258baec6d1ae0ed5efc2455a8364a2cb40303714d787e46c015d0b68b95616e214d5d44bf2310c095

  • SSDEEP

    96:yfzhjcCvqlmg0jZBo4FlhRheugIP5HgLCxr9/ul:yfzh/FvoWRhe8Rn/ul

Malware Config

Extracted

Family

remcos

Botnet

New

C2

janout21oadsts1.duckdns.org:57484

janout21oadsts1.duckdns.org:57483

janout21oadsts2.duckdns.org:57484

janout21oadsts3.duckdns.org:57484

janout21oadsts4.duckdns.org:57484

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    true

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    amaonspt.dat

  • keylog_flag

    false

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    lmoijuetgtso-X0FCJD

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      awb_shipping_documents_bl_inv_2024_12_04_000000000000000.cmd

    • Size

      7KB

    • MD5

      12ee31039816c33d31fb9dad778fe576

    • SHA1

      c1959d46a3384851398249cef3e27e5d0296f884

    • SHA256

      b1b8e1093c838012c779d0f80fff877ef269072b8807d53906e0c0aef343f9e4

    • SHA512

      95780e880506d8974ca70a683bd941c0c7d783d02b319760a7cd692c4526da9e82f5f21fa86d183d316dec4acef9c9a9c15f73695b9072774631d62ce5e1ddb8

    • SSDEEP

      96:zSqPH/nDhhlCkBx+/h8l4GwKga/BKvv1XrxKEXv5+SqapBF/H1n9pas:DHrhhlTv+p8l4GoYM31NKEXwapV90s

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks