General
-
Target
d9b0cdd1131c5686c45b57bd4b9663a5089ae14df0d3e967f9df4a76278761e2
-
Size
1.4MB
-
Sample
241227-dwecxa1ket
-
MD5
c8a1a34d11e4eda342918ebcde115dc1
-
SHA1
329810357b607684c49821fa13ddf6af8cfa0375
-
SHA256
d9b0cdd1131c5686c45b57bd4b9663a5089ae14df0d3e967f9df4a76278761e2
-
SHA512
cd0032f6ddf20ad4dbb94dbc67fb154e8874d322888cb34d19b2a48dd11aa03ab881a5a77251b713a05ef8db8891fa7f6e9e64ec80a8205fa90bb357bd50f1f7
-
SSDEEP
24576:4D39dlfGQrFUspugRNJI2DJnUw9W/j+BeKJq:4F+QrFUBgq25eKk
Static task
static1
Behavioral task
behavioral1
Sample
d9b0cdd1131c5686c45b57bd4b9663a5089ae14df0d3e967f9df4a76278761e2.exe
Resource
win7-20240903-en
Malware Config
Extracted
remcos
Host
213.183.58.19:4000
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
read.dat
-
keylog_flag
false
-
keylog_folder
CastC
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
remcos_sccafsoidz
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screens
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Extracted
remcos
1.7 Pro
Host
213.183.58.19:4000
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
read.dat
-
keylog_flag
false
-
keylog_folder
CastC
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
remcos_sccafsoidz
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screens
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
d9b0cdd1131c5686c45b57bd4b9663a5089ae14df0d3e967f9df4a76278761e2
-
Size
1.4MB
-
MD5
c8a1a34d11e4eda342918ebcde115dc1
-
SHA1
329810357b607684c49821fa13ddf6af8cfa0375
-
SHA256
d9b0cdd1131c5686c45b57bd4b9663a5089ae14df0d3e967f9df4a76278761e2
-
SHA512
cd0032f6ddf20ad4dbb94dbc67fb154e8874d322888cb34d19b2a48dd11aa03ab881a5a77251b713a05ef8db8891fa7f6e9e64ec80a8205fa90bb357bd50f1f7
-
SSDEEP
24576:4D39dlfGQrFUspugRNJI2DJnUw9W/j+BeKJq:4F+QrFUBgq25eKk
-
Remcos family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1