General

  • Target

    bafff28ad6d4b843fbd422d34d48470ac5b738c844232b71fb7e503a2f75d92d.7z

  • Size

    434KB

  • Sample

    250215-evpb6avjcr

  • MD5

    9f43a13fabbed8e92b859664f0bc26bb

  • SHA1

    cbd4e573b0674c52176deb62e57538803aaaf80d

  • SHA256

    bafff28ad6d4b843fbd422d34d48470ac5b738c844232b71fb7e503a2f75d92d

  • SHA512

    8979b76e5ed79a503c26f33a548ed91b10eff97c841259300b96d2f82a06685f96901c9c173b8ae24a05f9d1b8f9e71572f8374b4f29cdda80a7839b45d65131

  • SSDEEP

    12288:y+KheBGD+gi74U4LaCW69+F77GAunERwOb/:yvMBsFiVCWr7CAunEGi

Malware Config

Extracted

Family

remcos

Botnet

Aboki

C2

abokirem.duckdns.org:56379

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-J4I3IV

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      Teufelberger,pdf.vbs

    • Size

      565KB

    • MD5

      9b98d98f1219f50085218002b9d6d13e

    • SHA1

      98f7f59822afb1b87f7d5308f07fcfb54fc3c970

    • SHA256

      01ed509842998f2309e2aa5ff2aaba7f12fec0e25c7a7a6f01d5d672c6a06363

    • SHA512

      3fff27a5923af1d7834aa193602bd5231b2f0c0e498d5f87ed232602ef9c61c19a5a8cc11ae7df7b0576169d363c00b7ded0bcd5c980198b60bef56d5554027b

    • SSDEEP

      12288:pJrrbl3eNvxisBksII3s+ngAHjQVbF7ywmL/KSapUd:Ld3eBweII3e+kxpBpS

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Downloads MZ/PE file

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks