General

  • Target

    ab76db9334148f06e9422cb37bd4d3208fadd5fb17d3b36b4ac6db7996a77958N.exe

  • Size

    1.0MB

  • Sample

    241216-awrfpawqer

  • MD5

    1d1f700e4ea352cb6078f0205608f3d0

  • SHA1

    853f50de0accd7f098e6b5a9e691435be2bcb758

  • SHA256

    ab76db9334148f06e9422cb37bd4d3208fadd5fb17d3b36b4ac6db7996a77958

  • SHA512

    c0e9be003625557943197643f72ff040e46456490f9069e8eb98dd7f22925c314e985bed98ad33f1be7da48c57a6b6323454a1f4eb5ef62fa24cc8d42d44de1b

  • SSDEEP

    24576:CyBKoy6YVR7YW/+mJZcchEVq3xwhCR9est:zJLYzYWxZhEw3x6C9es

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost-NEW

C2

zitodavina.duckdns.org:9675

kizitodavina.kozow.com:9675

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    Audio.exe

  • copy_folder

    WindowsAudio

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    true

  • install_path

    %Temp%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    logz

  • mouse_option

    false

  • mutex

    Rmc-2K9NTE

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      ab76db9334148f06e9422cb37bd4d3208fadd5fb17d3b36b4ac6db7996a77958N.exe

    • Size

      1.0MB

    • MD5

      1d1f700e4ea352cb6078f0205608f3d0

    • SHA1

      853f50de0accd7f098e6b5a9e691435be2bcb758

    • SHA256

      ab76db9334148f06e9422cb37bd4d3208fadd5fb17d3b36b4ac6db7996a77958

    • SHA512

      c0e9be003625557943197643f72ff040e46456490f9069e8eb98dd7f22925c314e985bed98ad33f1be7da48c57a6b6323454a1f4eb5ef62fa24cc8d42d44de1b

    • SSDEEP

      24576:CyBKoy6YVR7YW/+mJZcchEVq3xwhCR9est:zJLYzYWxZhEw3x6C9es

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks