General

  • Target

    quarantine.7z

  • Size

    19.1MB

  • MD5

    5b07c232d32aca4142f1f7235acb1b71

  • SHA1

    b91e1b46372706234192d3d4193a1bd2e0ef6918

  • SHA256

    fbb1c5811042bfe6fbc3329c17e2bbb75279d315777768ef6b835a85e9331ef2

  • SHA512

    2c4e48f515f6e03618e96aebc0d2f1ce609979de646a762824ccacb4ddf9e0eedb832e520262091f2518ec08b9484dd445c464529229555f0df52ac49a60655f

  • SSDEEP

    393216:3+5A2xwXMIOBHj6+fv97p40UGjIb0AHN0AuAQwdrwqED+pXO1TSyTYHSS6+3:OdIMe+fVp4rQ60+aA6wdrYYhSS93

Malware Config

Extracted

Family

remcos

Botnet

hotel

C2

rm.bizvally.net:3397

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-5ITRQT

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Detects Rhadamanthys payload 1 IoCs
  • Remcos family
  • Rhadamanthys family
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Unsigned PE 6 IoCs

    Checks for missing Authenticode signature.

Files

  • quarantine.7z
    .7z
  • quarantine/BSFiC9K.exe
    .html
  • quarantine/ORaMflC.exe
    .html
  • quarantine/Setup_2024.exe
    .exe windows:4 windows x86 arch:x86

    f4639a0b3116c2cfc71144b88a929cfd


    Code Sign

    Headers

    Imports

    Sections

  • Click To Run.bat
  • configuration.xml
  • setup.exe
    .exe windows:5 windows x86 arch:x86

    9e71e4eb9e5e4331174aa2b57e2ff185


    Code Sign

    Headers

    Imports

    Sections

  • quarantine/ht.exe
    .exe windows:5 windows x86 arch:x86

    e77512f955eaf60ccff45e02d69234de


    Headers

    Imports

    Sections

  • quarantine/m5UP2Yj.exe
    .exe windows:5 windows x86 arch:x86

    2eabe9054cad5152567f0699947a2c5b


    Headers

    Imports

    Sections

  • quarantine/pic5.jpg
    .exe windows:5 windows x86 arch:x86

    32a31bfad8ca2c4b8a1a523b9cceb9d8


    Headers

    Imports

    Sections

  • quarantine/random.dllMain
    .html .js polyglot
  • quarantine/random.exe
  • quarantine/random_2.exe
    .exe windows:5 windows x86 arch:x86

    c4540f421523fe2dc591e50be5ad7d0b


    Headers

    Imports

    Sections

  • quarantine/random_3.exe
    .exe windows:5 windows x86 arch:x86

    2eabe9054cad5152567f0699947a2c5b


    Headers

    Imports

    Sections

  • quarantine/rh_0.8.0.exe
    .exe windows:6 windows x86 arch:x86

    dbd248d6a07e5b5d3562c903534448e7


    Headers

    Imports

    Sections

  • quarantine/sgu7U1r.exe
    .html
  • quarantine/xB2HL9g.exe
    .html
  • quarantine/xclient.exe
    .html