General

  • Target

    givenbestupdatedoingformebestthingswithgreatnewsformegive.hta

  • Size

    144KB

  • Sample

    241216-gzbb7sxpcv

  • MD5

    f1c8937918d65456c0565dc023e48210

  • SHA1

    487a5ff34609e3aaa41a1d7a92f3705f377ab31b

  • SHA256

    32f32787e8bbc5276d6f9d1d1d8b0f5f762b33df9abf8a820f34d6e702603b99

  • SHA512

    6f4e87018f6e4009f462691c57ab9f08e6b84b1b0d4cab58ffc2e8472bf78a01e4e0374c29d5c1745a6d4b6123022fe5c46dd4a4872204fb4e54867f4ace963f

  • SSDEEP

    768:t1E5YUGhum2oum2mS5KUJDVUKhCAGVf/AqYhASOA/lbkaRqqwS5z6Yr7CAtu48Zj:tf

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://res.cloudinary.com/dzvai86uh/image/upload/v1734050991/unxaooiykxfmw9pan4z1.jpg%20

exe.dropper

https://res.cloudinary.com/dzvai86uh/image/upload/v1734050991/unxaooiykxfmw9pan4z1.jpg%20

Extracted

Family

remcos

Botnet

RemoteHost

C2

kelexrmcadmnnccupdated.duckdns.org:14646

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-B3IX49

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      givenbestupdatedoingformebestthingswithgreatnewsformegive.hta

    • Size

      144KB

    • MD5

      f1c8937918d65456c0565dc023e48210

    • SHA1

      487a5ff34609e3aaa41a1d7a92f3705f377ab31b

    • SHA256

      32f32787e8bbc5276d6f9d1d1d8b0f5f762b33df9abf8a820f34d6e702603b99

    • SHA512

      6f4e87018f6e4009f462691c57ab9f08e6b84b1b0d4cab58ffc2e8472bf78a01e4e0374c29d5c1745a6d4b6123022fe5c46dd4a4872204fb4e54867f4ace963f

    • SSDEEP

      768:t1E5YUGhum2oum2mS5KUJDVUKhCAGVf/AqYhASOA/lbkaRqqwS5z6Yr7CAtu48Zj:tf

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • Blocklisted process makes network request

    • Evasion via Device Credential Deployment

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks