General
-
Target
JaffaCakes118_3e4f9302ae461234c85684a38be6319145799717a6ef50004fc55f5b22cf42cf
-
Size
254KB
-
Sample
241230-ac7css1me1
-
MD5
f40ffa0bc6da8df318e722b16184e75b
-
SHA1
7f36763e45646b07024e91447636a6af7a0911e0
-
SHA256
3e4f9302ae461234c85684a38be6319145799717a6ef50004fc55f5b22cf42cf
-
SHA512
42bf966e9d39e7df5db93bda8974c8dea7a14c0a131d8b7cab0af1f87a4ab76d8359fd9a8be8d98ca4788c1db60614c2298499f4c765ad3773c6db1fa6531166
-
SSDEEP
6144:vfsiyI106GURVSqgCsQYnsY3wzi3fvk9CrF9D:XZyIG6GGShQYnNwu3fvYs
Behavioral task
behavioral1
Sample
4492030951.exe
Resource
win7-20240729-en
Malware Config
Extracted
remcos
3.3.2 Pro
Luder
31.220.44.253:5222
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
true
-
hide_file
true
-
hide_keylog_file
false
-
install_flag
true
-
install_path
%UserProfile%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
h908hn+0938g3-Y4186N
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
svchost
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
notepad;solitaire;
Targets
-
-
Target
4492030951
-
Size
463KB
-
MD5
56cf2e34e8c4b39d3ecb18935a1e96df
-
SHA1
d7cddc46a566dffff1a808526f48c96ef4b64302
-
SHA256
e1bd512161ccc65e6dd85edda13d9b97d96867d8c45dbce407f7455d8f12a90c
-
SHA512
387bb997d64d5d6c38b5e9854ad595860bb482eab3df7064676fbccb8943326dbc9b8166d412d5750a7792ea6eb9f35526b8f7e76f811dd4bcf2ac3fc66ccc2c
-
SSDEEP
12288:uegN0jfYLclGb0bVT6e+MT2MffZS/ghSYo:QNywLclGIeMT2MXZRhSV
-
Remcos family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3