General

  • Target

    17346150108fd59162a7f50db4b74cc85f1873b39cc8eaeab355e353b3b8b18e8e21fd369d493.dat-decoded.exe

  • Size

    481KB

  • Sample

    241219-qt7ynatreq

  • MD5

    a3cfe4942b0ee84ab5a32698860f6ebf

  • SHA1

    835c4f861af46c8ee071041c8ada8acf8193a1da

  • SHA256

    3799b7afd9b7360155c78f5c93934d8bb304b6eda203c442a285b0992f1f8c36

  • SHA512

    bd9f9435b3c38d5f384b3bd78c7d250f69ab29a9d6dc7b1927cc43a9053ab200239c2a1c6b62d6972ae87a0d8fd36b964ca7f4e808e0de69671f57ed627e7237

  • SSDEEP

    12288:LuD09AUkNIGBYYv4eK13x13nZHSRVMf139F5wIB7+IwtHwBtVxbesvZDS1+DY:O09AfNIEYsunZvZ19Zes

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

kiolokgangan.duckdns.org:2430

apieconi.duckdns.org:2439

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-QJ4441

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      17346150108fd59162a7f50db4b74cc85f1873b39cc8eaeab355e353b3b8b18e8e21fd369d493.dat-decoded.exe

    • Size

      481KB

    • MD5

      a3cfe4942b0ee84ab5a32698860f6ebf

    • SHA1

      835c4f861af46c8ee071041c8ada8acf8193a1da

    • SHA256

      3799b7afd9b7360155c78f5c93934d8bb304b6eda203c442a285b0992f1f8c36

    • SHA512

      bd9f9435b3c38d5f384b3bd78c7d250f69ab29a9d6dc7b1927cc43a9053ab200239c2a1c6b62d6972ae87a0d8fd36b964ca7f4e808e0de69671f57ed627e7237

    • SSDEEP

      12288:LuD09AUkNIGBYYv4eK13x13nZHSRVMf139F5wIB7+IwtHwBtVxbesvZDS1+DY:O09AfNIEYsunZvZ19Zes

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks