Resubmissions

22-02-2025 19:44

250222-yf8xssxkap 10

General

  • Target

    search

  • Size

    467KB

  • Sample

    250222-yf8xssxkap

  • MD5

    943dced7be9d72fc43811b8c299c5deb

  • SHA1

    3f1ce827c50be7db40402b66c3a5341814cb6e9d

  • SHA256

    9a3ba1ea02e8c045a1e94e2f81c64565122df06f4d1f11018d1902f2adf80127

  • SHA512

    d8da3ba7149277cdb90d63acd29a5f25dd308c83341c15f9b912489161f59cddac91aa66efef22bdbc4cd7d1d43dca47d97c0a833b2317980cad9b9393dd1c3d

  • SSDEEP

    12288:AJ2vyEmW0MyPu3NEl1SmNW732GGSxcbZvBQjmBL6SCuphZ3B9c1DpH4OW9:AJ2vLoSxcbZvBQjmB5CupH33MDpH479

Malware Config

Extracted

Family

remcos

Version

1.7 Pro

Botnet

Host

C2

nickman12-46565.portmap.io:46565

nickman12-46565.portmap.io:1735

Attributes
  • audio_folder

    audio

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    5

  • copy_file

    Userdata.exe

  • copy_folder

    Userdata

  • delete_file

    true

  • hide_file

    true

  • hide_keylog_file

    true

  • install_flag

    true

  • install_path

    %WinDir%\System32

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • keylog_path

    %WinDir%\System32

  • mouse_option

    false

  • mutex

    remcos_vcexssuhap

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screens

  • screenshot_path

    %AppData%

  • screenshot_time

    1

  • startup_value

    remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Extracted

Family

revengerat

Botnet

Guest

C2

0.tcp.ngrok.io:19521

Mutex

RV_MUTEX

Targets

    • Target

      search

    • Size

      467KB

    • MD5

      943dced7be9d72fc43811b8c299c5deb

    • SHA1

      3f1ce827c50be7db40402b66c3a5341814cb6e9d

    • SHA256

      9a3ba1ea02e8c045a1e94e2f81c64565122df06f4d1f11018d1902f2adf80127

    • SHA512

      d8da3ba7149277cdb90d63acd29a5f25dd308c83341c15f9b912489161f59cddac91aa66efef22bdbc4cd7d1d43dca47d97c0a833b2317980cad9b9393dd1c3d

    • SSDEEP

      12288:AJ2vyEmW0MyPu3NEl1SmNW732GGSxcbZvBQjmBL6SCuphZ3B9c1DpH4OW9:AJ2vLoSxcbZvBQjmB5CupH33MDpH479

    • Dharma

      Dharma is a ransomware that uses security software installation to hide malicious activities.

    • Dharma family

    • Njrat family

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Revengerat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (661) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • RevengeRat Executable

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks