General

  • Target

    SecuriteInfo.com.Trojan.Win32.Makoob.9650.exe

  • Size

    724KB

  • Sample

    250327-evxcrsxtcw

  • MD5

    a479acd2da79c2dfeabc05b5d6194fba

  • SHA1

    18e8097c57cf691e5c2719ade7d2bca4573d9d23

  • SHA256

    359ab600c1c1cb25744c5fd24b563ed2fbcd4918061e6409929db2c8e16a070c

  • SHA512

    0a2d4564e0cd54394332bba59a9fbeb24afff121c420d51e5613bd3af333418ed4ef0b2b7bfcddd992857b8ec4cad773142028cbb48eaeeb8c0e433082070023

  • SSDEEP

    12288:LR3BUI4bnFjfy75TC+WfSCgoSdYza46l0xFXc3gIwEH:V3GI4jFe7EJKT1nl0Pg73H

Malware Config

Extracted

Family

remcos

Botnet

New-Host

C2

176.65.142.81:9090

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-C2AG7V

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      SecuriteInfo.com.Trojan.Win32.Makoob.9650.exe

    • Size

      724KB

    • MD5

      a479acd2da79c2dfeabc05b5d6194fba

    • SHA1

      18e8097c57cf691e5c2719ade7d2bca4573d9d23

    • SHA256

      359ab600c1c1cb25744c5fd24b563ed2fbcd4918061e6409929db2c8e16a070c

    • SHA512

      0a2d4564e0cd54394332bba59a9fbeb24afff121c420d51e5613bd3af333418ed4ef0b2b7bfcddd992857b8ec4cad773142028cbb48eaeeb8c0e433082070023

    • SSDEEP

      12288:LR3BUI4bnFjfy75TC+WfSCgoSdYza46l0xFXc3gIwEH:V3GI4jFe7EJKT1nl0Pg73H

    • Guloader family

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Loads dropped DLL

    • Accesses Microsoft Outlook accounts

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • Target

      $PLUGINSDIR/System.dll

    • Size

      11KB

    • MD5

      a436db0c473a087eb61ff5c53c34ba27

    • SHA1

      65ea67e424e75f5065132b539c8b2eda88aa0506

    • SHA256

      75ed40311875312617d6711baed0be29fcaee71031ca27a8d308a72b15a51e49

    • SHA512

      908f46a855480af6eacb2fb64de0e60b1e04bbb10b23992e2cf38a4cbebdcd7d3928c4c022d7ad9f7479265a8f426b93eef580afec95570e654c360d62f5e08d

    • SSDEEP

      192:aVL7iZJX76BisO7+UZEw+Rl59pV8ghsVJ39dx8T:d7NsOpZsfLMJ39e

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.