General

  • Target

    sostener.vbs

  • Size

    210KB

  • Sample

    240511-nvyehaee6x

  • MD5

    0f8dfb470e4e95aad3aca2bdec3e64ad

  • SHA1

    af0979c4780e47a3f44a428b7f7f839434e0a43b

  • SHA256

    d99ef4f74f7929ccab7db338318181e2813b7d4e9259a95e6d1a70441e52f4ff

  • SHA512

    2aa4ec1dd2fe240754e24efb2c6675d6bb6822cd27ab0c88ffb018c00349e7bdbfb15c3771ba9eb82bc4df3ae452151586abba052b24dcff24bf8944768504e6

  • SSDEEP

    1536:ben2+mzXdnsE+tZsd99CObiFCocEW1aJK66n5yhtW0/5JpWn4c1Ig0BfbUZlu9gn:YEsZsdg9JK6X/vc+g0BfcQ7P8

Malware Config

Extracted

Family

remcos

Botnet

FENIX

C2

newssssssssssssss.duckdns.org:2404

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    registros.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-NDSLIH

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Capturas de pantalla

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      sostener.vbs

    • Size

      210KB

    • MD5

      0f8dfb470e4e95aad3aca2bdec3e64ad

    • SHA1

      af0979c4780e47a3f44a428b7f7f839434e0a43b

    • SHA256

      d99ef4f74f7929ccab7db338318181e2813b7d4e9259a95e6d1a70441e52f4ff

    • SHA512

      2aa4ec1dd2fe240754e24efb2c6675d6bb6822cd27ab0c88ffb018c00349e7bdbfb15c3771ba9eb82bc4df3ae452151586abba052b24dcff24bf8944768504e6

    • SSDEEP

      1536:ben2+mzXdnsE+tZsd99CObiFCocEW1aJK66n5yhtW0/5JpWn4c1Ig0BfbUZlu9gn:YEsZsdg9JK6X/vc+g0BfcQ7P8

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks