General

  • Target

    INVOICEDDOCUMENTFILE00DH405858FEGHR88R.tar

  • Size

    932KB

  • Sample

    250204-w7j2mswngv

  • MD5

    61438ad4be36c8256b3f97bbdd15dac2

  • SHA1

    aee91366bb4646397823d73e9906247605502f94

  • SHA256

    b1dd46f1ff62dea312ca3fa6f2bb5c23161971fcd71ce23fa8bf921501384f05

  • SHA512

    12df1b1ab30f2d57915131c846a973c228573d8f83138e2ebc5aebd72d2265ac5d6a056794f7013b6a047f381daef2ba746723c822e468b70de60625650b9888

  • SSDEEP

    24576:cSrIJulBXTqaBNlmMh+/3Vo1Y9INRSV/FobdERvNrAm:Rs6T9Bnmz/3V5KrSLobd2ZX

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

tjwpn04kn.localto.net:2247

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    hytg

  • mouse_option

    false

  • mutex

    Rmc-JD0XH1

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      vwfGI75DCjPX5gK.pif

    • Size

      1.1MB

    • MD5

      1692cdb5ee56b3f17e1aa1514c8dd3e8

    • SHA1

      6323c53db834380949ec820c2964bbe079662ad4

    • SHA256

      0ee949c974ffb77c9c61400f423355b9670d0b5918a85331bb34b15fa6a1d20b

    • SHA512

      48844ff2e284010c2f33d8a1837413766d16b6cbf5d3b24035ded467c8ca4313be3db0a42e5a8c680d8d198e2ea6782067df502d9e465e19aa07fa58bf5914ee

    • SSDEEP

      24576:BAorweYxrXqa1dNMQd+TtnSXYv+Nd+Vp3obdg3vb6u:BvwFX91zMhTtnJmH+zobdS6u

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks