Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28-01-2025 06:45

General

  • Target

    a1ef556ed0fc0f7394571acdf9ea7c773843c0a93708f873e5218efd09dfc7d6.exe

  • Size

    216KB

  • MD5

    d280ee0e72c9754a03b0f1e16625340e

  • SHA1

    29853efdf3bd2bd197f3db0ddb04a5d34111137e

  • SHA256

    a1ef556ed0fc0f7394571acdf9ea7c773843c0a93708f873e5218efd09dfc7d6

  • SHA512

    5994bebcb0c201bea421f38e4968eb71d4dc06dd7c275c79985c08a4b9d77ecc9a2d20a2b91ffc2f2fe50f269b2fd2488f0dee67ed32483ee08cb7a30dc448e7

  • SSDEEP

    3072:r7J0hwT6LPmFntc2rnEtfqQ8M14+WUsOpBPG17z8jIygGwqSUdXQIlDlq/tmooun:3Jc9LPYnK0EtYMWqbBPGKYGxxVInoS

Malware Config

Extracted

Family

remcos

Botnet

Blessedman

C2

realtimeinc.duckdns.org:2025

realtimeinc.duckdns.org:2026

offlinetimedns.duckdns.org:3920

moneybanks.mysynology.net:3925

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-707M3H

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • UPX packed file 16 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a1ef556ed0fc0f7394571acdf9ea7c773843c0a93708f873e5218efd09dfc7d6.exe
    "C:\Users\Admin\AppData\Local\Temp\a1ef556ed0fc0f7394571acdf9ea7c773843c0a93708f873e5218efd09dfc7d6.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2036

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\remcos\logs.dat

    Filesize

    144B

    MD5

    b47751090a960d51a0f161a7d4f0647a

    SHA1

    62c013692a2f0dfcb6db2f01c602aac89e90cf4a

    SHA256

    088c4e827ed037caf2c7d2107506ddf723640aacc0521137ab6f30a95a5add35

    SHA512

    a69bc19bcc0aaf5d706055a7d628b605182aa1f5eba17ea8cf8be2a9e90cda76774f6fe0f9d1ad2dcdd1af9bc148ecb53f71215ce53fdf891ec4881c48a335fd

  • memory/2036-19-0x0000000000400000-0x0000000000489000-memory.dmp

    Filesize

    548KB

  • memory/2036-16-0x0000000000400000-0x0000000000489000-memory.dmp

    Filesize

    548KB

  • memory/2036-7-0x0000000000400000-0x0000000000489000-memory.dmp

    Filesize

    548KB

  • memory/2036-3-0x0000000000400000-0x0000000000489000-memory.dmp

    Filesize

    548KB

  • memory/2036-22-0x0000000000400000-0x0000000000489000-memory.dmp

    Filesize

    548KB

  • memory/2036-13-0x0000000000400000-0x0000000000489000-memory.dmp

    Filesize

    548KB

  • memory/2036-4-0x0000000000400000-0x0000000000489000-memory.dmp

    Filesize

    548KB

  • memory/2036-0-0x0000000000400000-0x0000000000489000-memory.dmp

    Filesize

    548KB

  • memory/2036-10-0x0000000000400000-0x0000000000489000-memory.dmp

    Filesize

    548KB

  • memory/2036-24-0x0000000000400000-0x0000000000489000-memory.dmp

    Filesize

    548KB

  • memory/2036-28-0x0000000000400000-0x0000000000489000-memory.dmp

    Filesize

    548KB

  • memory/2036-31-0x0000000000400000-0x0000000000489000-memory.dmp

    Filesize

    548KB

  • memory/2036-34-0x0000000000400000-0x0000000000489000-memory.dmp

    Filesize

    548KB

  • memory/2036-37-0x0000000000400000-0x0000000000489000-memory.dmp

    Filesize

    548KB

  • memory/2036-40-0x0000000000400000-0x0000000000489000-memory.dmp

    Filesize

    548KB

  • memory/2036-43-0x0000000000400000-0x0000000000489000-memory.dmp

    Filesize

    548KB