General
-
Target
JaffaCakes118_8b2666d4856f98b157dd705cc3a13f1c9203e432d841251528d31460968c89e8
-
Size
1.4MB
-
Sample
241229-hn9w3awker
-
MD5
3702ff38924ec1cf5689b184d9988984
-
SHA1
c663d2c8351388ebd9195731b419f4c655739a2d
-
SHA256
8b2666d4856f98b157dd705cc3a13f1c9203e432d841251528d31460968c89e8
-
SHA512
15c4729e6431c22e0f022d6b5480aa5558ab7e0f6994d7d29704590ad10a8e92a2d79ecd0eb62df669c65e48a87d4ca9c36242a341d2c9f58ae87aff59ba58b5
-
SSDEEP
24576:7M6lNwTPvZHvkqfLLy9dJ+G9tRuJ77ftm1aBCY+YOTo5fW/lS3VW9rls3:QuN2sky9dYfftm1aYZtTo5fUlYVW963
Static task
static1
Behavioral task
behavioral1
Sample
MUrCVpcnKl3TR9r.exe
Resource
win7-20240903-en
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Extracted
remcos
3.1.4 Pro
ff
64.44.139.178:7200
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-EQ1491
-
screenshot_crypt
false
-
screenshot_flag
true
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
notepad;solitaire;
Targets
-
-
Target
MUrCVpcnKl3TR9r.exe
-
Size
1.7MB
-
MD5
91988de4e4b2afd8a555630fa6cfdef7
-
SHA1
31c8e99d816f5df8ce8f152002405ba40257cdf6
-
SHA256
e0282af4b6dc2361d472e2c8bae5e3c54d4564400980ec27587300cf1b7464e0
-
SHA512
ae8314ff9a117e77db441050ca79ed297700140f9e5bd80592422f1e658b21b7defe322887facd668e42ae85d6418d72049d8a92349fe78f4ea3846f68ceaf60
-
SSDEEP
49152:shPfOrFw7mIYTVAh2nHFa1mvC8H+vef7+q7U:shPfOrrPTVLFatB8
-
Modifies WinLogon for persistence
-
Remcos family
-
Xred family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1