General

  • Target

    858447546cf36dd527c1681dbfd411896799bb4970fe3f8db40c366599880477

  • Size

    1.2MB

  • Sample

    250217-tbrqha1ns9

  • MD5

    d367a5f6ef5348bb19df2feeef4d1d84

  • SHA1

    d9aba2069b24b4874314b9a36fe55b8e7b62d55c

  • SHA256

    858447546cf36dd527c1681dbfd411896799bb4970fe3f8db40c366599880477

  • SHA512

    92ab4c5aea5c87399b21287f2d0f5580b71696a02fc3534c8fa4fd620fda08820c899507e7581edb711956c85bb4b6304bd91faa20ecd216c1fae09594db534e

  • SSDEEP

    24576:uPAbms9IoHaDWP6sHreukWZZiLT6mEhQuEmMpYTuAD+d:dZIcVhLeWeWhemM+LW

Malware Config

Extracted

Family

remcos

Botnet

SEGUROS BOLIVAR

C2

donato.con-ip.com:6014

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    datos

  • mouse_option

    false

  • mutex

    udjgfhjdopajdfegvx-OY1HPL

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      858447546cf36dd527c1681dbfd411896799bb4970fe3f8db40c366599880477

    • Size

      1.2MB

    • MD5

      d367a5f6ef5348bb19df2feeef4d1d84

    • SHA1

      d9aba2069b24b4874314b9a36fe55b8e7b62d55c

    • SHA256

      858447546cf36dd527c1681dbfd411896799bb4970fe3f8db40c366599880477

    • SHA512

      92ab4c5aea5c87399b21287f2d0f5580b71696a02fc3534c8fa4fd620fda08820c899507e7581edb711956c85bb4b6304bd91faa20ecd216c1fae09594db534e

    • SSDEEP

      24576:uPAbms9IoHaDWP6sHreukWZZiLT6mEhQuEmMpYTuAD+d:dZIcVhLeWeWhemM+LW

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks