General

  • Target

    6B509B581157E265D6E3D2BDEED463195464DAEAFE98B57CEA4EF59141D21B62

  • Size

    1.3MB

  • Sample

    250103-jnvyksxpaq

  • MD5

    5d15087ab767a84ec8e8805bb26eb8b8

  • SHA1

    01bba4ff864c053b3485b20cb4e60666be7355a7

  • SHA256

    6b509b581157e265d6e3d2bdeed463195464daeafe98b57cea4ef59141d21b62

  • SHA512

    dcc463497cfbe933de85999b6010382b82a449f827621f1f5215a9459696f80172e69019b8d1385d2fc3edfe0543035b73042cbab7d2b860c8e382d8fa9d5805

  • SSDEEP

    24576:ztb20pkaCqT5TBWgNQ7azerXt4yv6uaDWBq74Ws66A:wVg5tQ7azeryYA4OZj5

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

192.3.64.152:2559

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-ZFXG9Y

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      6B509B581157E265D6E3D2BDEED463195464DAEAFE98B57CEA4EF59141D21B62

    • Size

      1.3MB

    • MD5

      5d15087ab767a84ec8e8805bb26eb8b8

    • SHA1

      01bba4ff864c053b3485b20cb4e60666be7355a7

    • SHA256

      6b509b581157e265d6e3d2bdeed463195464daeafe98b57cea4ef59141d21b62

    • SHA512

      dcc463497cfbe933de85999b6010382b82a449f827621f1f5215a9459696f80172e69019b8d1385d2fc3edfe0543035b73042cbab7d2b860c8e382d8fa9d5805

    • SSDEEP

      24576:ztb20pkaCqT5TBWgNQ7azerXt4yv6uaDWBq74Ws66A:wVg5tQ7azeryYA4OZj5

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks