General

  • Target

    8f4cb0baad6c95c6c6e26de2fe111686d4801f87da7aed5b2b5db94cd8daa882

  • Size

    1.1MB

  • Sample

    250214-qcfsvaxjcj

  • MD5

    000b18addbe73ff0d85876817e451a95

  • SHA1

    d1a8cd07f17916d3b60b10db09ad9ff1983b9a59

  • SHA256

    8f4cb0baad6c95c6c6e26de2fe111686d4801f87da7aed5b2b5db94cd8daa882

  • SHA512

    9e229da99dd8304291b2b563d979147b7ae2383454f9ba304fc514e59cf3e3dd7b3f6f866b91da4d6aac1df5b0d23c67e5be9a5517f9e462fde628ccafe93290

  • SSDEEP

    24576:zezav4fPNvgOupQ+8xh+0O5XfNrbNypISi1k/O3z9IawQceqz0Cc68S:54fPNvgO3zhwXfNfAISi1Iw001S

Malware Config

Extracted

Family

remcos

Botnet

FEB 13

C2

oktoviyanto.ddns.net:9373

103.186.117.61:9373

benhenry2234.zapto.org:9373

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-MK1WZA

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      Bukti-Transfer..pdf.exe

    • Size

      1.3MB

    • MD5

      62bf026c84bdd7358c90d811a884ee9a

    • SHA1

      2c7981b703dcf58b2955395cb1fb7e796de9f1a4

    • SHA256

      18f7d8baabaee1f33165f8be68118400d9ac93393ac2352c53f014f45e623aba

    • SHA512

      9820afd72c7d028e4d9ed953551137c02da23ed3a76b2f94590a233da617abb3392485272529208007d115b4d021b139f40234fa0c66f42a3549d5b2cb65b07a

    • SSDEEP

      24576:IKaHUIr+zim0CY8iMSjRlgAgBVP+z9SukaqDoXaadupi8EU6btt:xaHUIr+g8iMSjRlg1PgfCyuUhL

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks