General

  • Target

    Ref. 56433905218740.7z

  • Size

    1.2MB

  • Sample

    250120-r9we8svkhs

  • MD5

    c0b93e07e7acc9a1b9b558e6b1940999

  • SHA1

    33a91f6819dba694acb0f6c2cd8085b0d1139ba4

  • SHA256

    c3278553bbfd3a24ad3207c1360c979bfe5d023f39e103438c4f66987cdc1da1

  • SHA512

    5be66a0cc31059bed16ebc925c71179c25e287ce0fc143445246f08f0174094238d0daeabbe9a6f2df012818a567de76dc8515664b4dcc0a98da3d2becc998a8

  • SSDEEP

    24576:9N/BUBb+tYjBFHNuuNVEtaST6Zi23v2NEXiM0hD6di/A9+:XpUlRhNV7GaSTTw/XiM0hDTV

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

206.189.218.238:4782

206.189.218.238:2286

206.189.218.238:3363

206.189.218.238:3386

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-9IFJWE

  • screenshot_crypt

    false

  • screenshot_flag

    true

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    1

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      Ref. 56433905218740.exe

    • Size

      1.2MB

    • MD5

      2ed1d515b213dfafa2ac37fa4b9e8191

    • SHA1

      b1f09651ad63871c2e41e2db2b29b9f2c3598b12

    • SHA256

      4ee8706cd6bf820a75a528e933d35a306ac18d466cc989a3317be9f5be9c1e5e

    • SHA512

      1a0b1e8430844e810f4c23806afa33b318f88d51e1f7aa2646d722d6c1293b7888d97b68e2680e1b8d30c324bc4cc9823782ee7c25b59347f8cab4a7ba3b1ba0

    • SSDEEP

      24576:bN/BUBb+tYjBFHNuuNVEtaST6Zi23v2NEXiM0hD6di/A9n:JpUlRhNV7GaSTTw/XiM0hDTy

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks