General

  • Target

    6455edf671362bff99424c329856d1c28b02ed39c45dad8cfa2fda18e9ae236cN.exe

  • Size

    558KB

  • Sample

    250202-lyrd9ayldp

  • MD5

    39364ae4b3deed920bcfe9e893d73980

  • SHA1

    3c762c7269bae09bb8340c6bfc5467c48a49c126

  • SHA256

    6455edf671362bff99424c329856d1c28b02ed39c45dad8cfa2fda18e9ae236c

  • SHA512

    1cfde0cc995b70added907388f687bfc9654ec27529a2c348e8692415b2ea8aaf0dacbd18e137e1758157d4bcb0d6de58ffc5472651f6df33163d9824a162186

  • SSDEEP

    12288:D13ak/mBXTG4/1vN8KI7ZnMEF7nfJqmsvZQBSoBjvrEH7x:pak/mBXTV/RNnEF7fgFZ+DrEH7x

Malware Config

Extracted

Family

remcos

Botnet

09 ENERO

C2

bienvenidoperezlora.kozow.com:1880

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-4QLQ2T

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      6455edf671362bff99424c329856d1c28b02ed39c45dad8cfa2fda18e9ae236cN.exe

    • Size

      558KB

    • MD5

      39364ae4b3deed920bcfe9e893d73980

    • SHA1

      3c762c7269bae09bb8340c6bfc5467c48a49c126

    • SHA256

      6455edf671362bff99424c329856d1c28b02ed39c45dad8cfa2fda18e9ae236c

    • SHA512

      1cfde0cc995b70added907388f687bfc9654ec27529a2c348e8692415b2ea8aaf0dacbd18e137e1758157d4bcb0d6de58ffc5472651f6df33163d9824a162186

    • SSDEEP

      12288:D13ak/mBXTG4/1vN8KI7ZnMEF7nfJqmsvZQBSoBjvrEH7x:pak/mBXTV/RNnEF7fgFZ+DrEH7x

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks