General

  • Target

    numer faktury_505603890324·pdf.vbs

  • Size

    19KB

  • Sample

    240402-qphszabc6z

  • MD5

    c9db37c76aee446f6df17e38469cc5f5

  • SHA1

    d59d6620ceb71f5bf629c3837340d30a000dc098

  • SHA256

    fe7ff83680ff3855e060227bddf560db0fe75b141db516320674dace99202224

  • SHA512

    ba0888d72496a7518773c3f9fce912ff2b7f43e34dbc06d84b3346c109ff2837b09dd91fd04c75c708fc8a5fd5c4741b03327834aef37c63ff5884cbbe196351

  • SSDEEP

    192:luOrrF5DUyLdYC/ShXcwyoXvWM24RUQr9OFmZOSxn57UYDb/AT/2PszfEciA6aT8:YgF52Muv/OEV7JDQ/2PszfEBhc8

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

a458386d9.duckdns.org:3256

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    true

  • hide_keylog_file

    false

  • install_flag

    true

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-KQ00DZ

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      numer faktury_505603890324·pdf.vbs

    • Size

      19KB

    • MD5

      c9db37c76aee446f6df17e38469cc5f5

    • SHA1

      d59d6620ceb71f5bf629c3837340d30a000dc098

    • SHA256

      fe7ff83680ff3855e060227bddf560db0fe75b141db516320674dace99202224

    • SHA512

      ba0888d72496a7518773c3f9fce912ff2b7f43e34dbc06d84b3346c109ff2837b09dd91fd04c75c708fc8a5fd5c4741b03327834aef37c63ff5884cbbe196351

    • SSDEEP

      192:luOrrF5DUyLdYC/ShXcwyoXvWM24RUQr9OFmZOSxn57UYDb/AT/2PszfEciA6aT8:YgF52Muv/OEV7JDQ/2PszfEBhc8

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks