Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    dfc6da93f93521375a1c87f8a99b069c4440939f93d7bf90cf30c140eec0df4bN.exe

  • Size

    903KB

  • Sample

    250323-dbspss1nz4

  • MD5

    48bd99be6b0f63e8f6cb8222275f6080

  • SHA1

    3f2a535aff3d26f6bb3bd799a8f5a8dbcd286458

  • SHA256

    dfc6da93f93521375a1c87f8a99b069c4440939f93d7bf90cf30c140eec0df4b

  • SHA512

    4e369a68cfe44c019b19f35914b51d857a8eb33a974475b45b5604124924780f94feb0fb70ea83a1f2393d66fd24ff4e4a2e8ec5dad68d5c268873c943694b4f

  • SSDEEP

    12288:tp+rgRNyA55IxJ+feDOa9rZj5XqkJD0QrOod7XxlW91RRz9MH:tpugRNJI1D39dlfGQrFUx9MH

Malware Config

Extracted

Family

remcos

Version

1.7 Pro

Botnet

Host

C2

213.183.58.19:4000

Attributes
  • audio_folder

    audio

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    5

  • copy_file

    remcos.exe

  • copy_folder

    remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    true

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    true

  • keylog_file

    read.dat

  • keylog_flag

    false

  • keylog_folder

    CastC

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    remcos_sccafsoidz

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screens

  • screenshot_path

    %AppData%

  • screenshot_time

    1

  • startup_value

    remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Extracted

Family

remcos

Botnet

Host

C2

213.183.58.19:4000

Attributes
  • audio_folder

    audio

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    5

  • copy_file

    remcos.exe

  • copy_folder

    remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    true

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    true

  • keylog_file

    read.dat

  • keylog_flag

    false

  • keylog_folder

    CastC

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    remcos_sccafsoidz

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screens

  • screenshot_path

    %AppData%

  • screenshot_time

    1

  • startup_value

    remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      dfc6da93f93521375a1c87f8a99b069c4440939f93d7bf90cf30c140eec0df4bN.exe

    • Size

      903KB

    • MD5

      48bd99be6b0f63e8f6cb8222275f6080

    • SHA1

      3f2a535aff3d26f6bb3bd799a8f5a8dbcd286458

    • SHA256

      dfc6da93f93521375a1c87f8a99b069c4440939f93d7bf90cf30c140eec0df4b

    • SHA512

      4e369a68cfe44c019b19f35914b51d857a8eb33a974475b45b5604124924780f94feb0fb70ea83a1f2393d66fd24ff4e4a2e8ec5dad68d5c268873c943694b4f

    • SSDEEP

      12288:tp+rgRNyA55IxJ+feDOa9rZj5XqkJD0QrOod7XxlW91RRz9MH:tpugRNJI1D39dlfGQrFUx9MH

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks