General

  • Target

    a326bbb242a11e0cd4155f58bcffa36b99487cf0d655359fd161e905577d8254.msi

  • Size

    2.9MB

  • Sample

    250217-ehwkpszjct

  • MD5

    91e248c8a0b605eb3302dd8c036c3392

  • SHA1

    0877c798687043d14b7d4aeca03e3ed960ac1689

  • SHA256

    a326bbb242a11e0cd4155f58bcffa36b99487cf0d655359fd161e905577d8254

  • SHA512

    31efcbce7ea057ca7b6c6183097a7b367d4b93dfbe6f88fd4306ba3b7dd65b181dc8fd518b5de8c1f0b078578ae6cd268d5f710389dc99e9e55b33126ffc2539

  • SSDEEP

    49152:qL51ahTWxFOlm43he+4Xkt1i1XkIZ9fm5urK7olHgnIxQQ6brit:K8h8ME4xr461ckZPoxgnsSa

Malware Config

Extracted

Family

remcos

Botnet

v2

C2

185.157.162.126:1995

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    qsdazeazd-EL00KX

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      a326bbb242a11e0cd4155f58bcffa36b99487cf0d655359fd161e905577d8254.msi

    • Size

      2.9MB

    • MD5

      91e248c8a0b605eb3302dd8c036c3392

    • SHA1

      0877c798687043d14b7d4aeca03e3ed960ac1689

    • SHA256

      a326bbb242a11e0cd4155f58bcffa36b99487cf0d655359fd161e905577d8254

    • SHA512

      31efcbce7ea057ca7b6c6183097a7b367d4b93dfbe6f88fd4306ba3b7dd65b181dc8fd518b5de8c1f0b078578ae6cd268d5f710389dc99e9e55b33126ffc2539

    • SSDEEP

      49152:qL51ahTWxFOlm43he+4Xkt1i1XkIZ9fm5urK7olHgnIxQQ6brit:K8h8ME4xr461ckZPoxgnsSa

    • Detects HijackLoader (aka IDAT Loader)

    • HijackLoader

      HijackLoader is a multistage loader first seen in 2023.

    • Hijackloader family

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • Drops startup file

    • Adds Run key to start application

    • Downloads MZ/PE file

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks