General

  • Target

    shereallyliketokissy9uuoisheismygirlfriendswholovesmetrulygo.hta

  • Size

    46KB

  • Sample

    250128-kj5gwstjht

  • MD5

    05887835a99ba5b4c9af5be59cbd3666

  • SHA1

    c3354d324fd9abe310cb080d80ddd55b02785f92

  • SHA256

    cc7d77d7eaf78658e21a950213d1a21c9bc45b1ba279400cbd984468ee721d20

  • SHA512

    51af02d7eefdee5fa6e7d327575f137efa1af38037875c2141c37156b2bc10afabbdcd15cb0fd436ddce6d6ae55b896ff03702a3ca774fc8988f99a888af48da

  • SSDEEP

    96:IQtaPnLI1mIAvBIAhYcJfw3KwZYxxUunyklIAZBIA35xmIIASGjz:tta/MnAGAFwZYEAMAYASGjz

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

hugobross.duckdns.org:1243

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-TA8VXN

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      shereallyliketokissy9uuoisheismygirlfriendswholovesmetrulygo.hta

    • Size

      46KB

    • MD5

      05887835a99ba5b4c9af5be59cbd3666

    • SHA1

      c3354d324fd9abe310cb080d80ddd55b02785f92

    • SHA256

      cc7d77d7eaf78658e21a950213d1a21c9bc45b1ba279400cbd984468ee721d20

    • SHA512

      51af02d7eefdee5fa6e7d327575f137efa1af38037875c2141c37156b2bc10afabbdcd15cb0fd436ddce6d6ae55b896ff03702a3ca774fc8988f99a888af48da

    • SSDEEP

      96:IQtaPnLI1mIAvBIAhYcJfw3KwZYxxUunyklIAZBIA35xmIIASGjz:tta/MnAGAFwZYEAMAYASGjz

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Blocklisted process makes network request

    • Evasion via Device Credential Deployment

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook accounts

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.