General

  • Target

    Receipt-202431029B3.zip

  • Size

    932KB

  • Sample

    241217-swhgwstken

  • MD5

    b99178cbf8a5282a151937bbc74138d6

  • SHA1

    04797410e5f1cb259b3e19ab629d93c203adb7c7

  • SHA256

    53ee1cf2f76ca5ca7eb3cbad6fa38a5dc04126fa7e3efa7e7449af4b1e659b8c

  • SHA512

    055e99b8a5c82383cd7f56c9bd171821632ed787d935ceaadd720dc114818342fe0ef3210a421035baa84090bc308465d20001c2e982c232338deb2a2ea9dd94

  • SSDEEP

    24576:yJIZirvRjAWeSS9Rj1a2et8EKn/OPQhnrDMYno2IGtL:y0iLRjAWL2evSUYnonGtL

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

172.245.244.69:2404

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    JavaRuntime.exe

  • copy_folder

    Java

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    true

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-I0P1F7

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    JavaRuntime

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      Receipt-#202431029B3.exe

    • Size

      1.2MB

    • MD5

      152c7485cbeb3bc280d028e065891d6e

    • SHA1

      0ddffbb675b4569217ea960b288da13a67801983

    • SHA256

      1420ee82c4ec66f06a832f01c43b0aca270fa9990f82f23fb36b899cabe11590

    • SHA512

      1dc27627c964b8d39251833e4a97b3c51b334fd9cdc132094082a1ac4cae4a6d97258e04e9b87de929c18340d4af53768fa99469085db777bafb59559b1208b3

    • SSDEEP

      24576:dMZMXvpjs+e2azR9jSca2PEt2kWT3GJqhDYRoPd+pT2A:AMfpjs+b2PEfYY+PspT2A

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks