General

  • Target

    cfaa84f19fc44953fb2c1e4ec256f758.bin

  • Size

    504KB

  • Sample

    240531-dk3w5ach6y

  • MD5

    7db1db0407c4d0173792c52ae0c844b7

  • SHA1

    7c2215c4ae85c82fe34c8e631e433c0ca93fdd2f

  • SHA256

    f1a8d2ea6ed01c083b95dfcd77f82bf5305e081e7b250318b7ded19952c4ecc3

  • SHA512

    86e2962b064a2086df6947bc0f04e924db33f71999316c8f144c36d74ad5e6095e2dcef4c453a8256f01f66ecd681928ee62c7f5859dc7d38f03936222091764

  • SSDEEP

    12288:0iLJssg6/IcGpnOADiidV1EWXynWDHnAxYyFW:0iLWspLGFOAbdT6+n2W

Malware Config

Extracted

Family

remcos

Version

1.7 Pro

Botnet

Host

C2

william2243.duckdns.org:1598

Attributes
  • audio_folder

    audio

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    5

  • copy_file

    remcos.exe

  • copy_folder

    remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    true

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    remcos_pdaejuprezbgooi

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screens

  • screenshot_path

    %AppData%

  • screenshot_time

    1

  • startup_value

    remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      Mtn03 Credit Receipt Jpg.exe

    • Size

      519KB

    • MD5

      c39c874e0184d91e2a9ca393c919bac3

    • SHA1

      2ce663a89bf9b7f2dbb8f847585bebd60cee52c7

    • SHA256

      86b29c8b17f5e01fe26349520452e9cf853cfb816ef46f37b071f02b7d96d603

    • SHA512

      8ce86457420fef18bb56c86c8af629752ab652ff45332799e8c4b39e856b209a64f9d9024be21da86f1288767e5dcf4ab41ca8cfc6f6f12f20d2419a92c5a91e

    • SSDEEP

      12288:ivNVAT3iHR0R3ZvDSQJZTebqRkTsekknxN:AVgyHR0TvOQJkma/N

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks