General

  • Target

    GRN of PI.Y015_2024 (08.01.25)’-password(AcQ70YuH).zip

  • Size

    1.7MB

  • Sample

    250109-qrhwrasrdj

  • MD5

    21f0ff7651023689a8fec1b7a8504c09

  • SHA1

    a00e61fbcd31ce7a7da65427411479671416d928

  • SHA256

    02dd32540b942e33753047c6d66b5ddb301f18ec5fc27395bd9d1c29c75ebdf3

  • SHA512

    654e43f808690db3f58326d0d55dbdc7df8ffe9a2a5dcb559627417d633882c97534a69615cf144ce064643ecaae1ef492a2e766dabc12709647999dc85f875c

  • SSDEEP

    49152:DpqwngeK/tousi9+BlyLr5Morwi8+ltck+gakly8Jsh43nOr:DkIfDS4K5twi8Ch+gvyssJ

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

206.189.218.238:4782

206.189.218.238:2286

206.189.218.238:3363

206.189.218.238:3386

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-9IFJWE

  • screenshot_crypt

    false

  • screenshot_flag

    true

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    1

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      GRN of PI.Y015_2024.exe

    • Size

      1.2MB

    • MD5

      91fe65e69f57bec84c6f6824b0583bc9

    • SHA1

      491ef91162964bddb52b91b63d4a2b9501b535e0

    • SHA256

      6606e17397f9f74cceb45afad23090d5af2daff5a7ad52cd0d25a0af0f77cc1c

    • SHA512

      c1b9dcb9440de3e2b7259bbd435d67e144225136e0e42824407185d835cae3d74723064c5bc07d2a90ff7204d8949845005b30e7c0e2cb6f2547947a13fc290c

    • SSDEEP

      24576:bN/BUBb+tYjBFHNuuNVXtaST6Zi2yTlqy8UMnXiM0hD6di/Act:JpUlRhNV79aSTTtRUnXiM0hDTj

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks