General
-
Target
sostener.vbs
-
Size
2.8MB
-
Sample
240826-fj5ensxfjr
-
MD5
9f31e7ec269ef7f755b7bd75e0579b18
-
SHA1
bdfa3e314195f23437a420782b4912e60a685a96
-
SHA256
4ab223a4ed0eaced6dc3a2cc74953a453770bb030336f349cd37f2ef24b65c30
-
SHA512
9aec4444247c4f4b8c0a0203dec53abc3fe64de2c2e86de79e57ecd003920d2ffacef90c09afcfdb51e61df98dcc3423feeaa97eade1a6e6854adc8ff10e8b3c
-
SSDEEP
192:8rkrkrErErErErErkrkrErErErErErkrkrErErErErErkrkrErErErErErkrkrE1:2WPE09IvR4
Static task
static1
Behavioral task
behavioral1
Sample
sostener.vbs
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
sostener.vbs
Resource
win10v2004-20240802-en
Malware Config
Extracted
http://pastebin.com/raw/V9y5Q5vv
Extracted
remcos
Matrix Fenix*
newssssssssssssss.duckdns.org:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
registros.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-XDNGQ0
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Capturas de pantalla
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
sostener.vbs
-
Size
2.8MB
-
MD5
9f31e7ec269ef7f755b7bd75e0579b18
-
SHA1
bdfa3e314195f23437a420782b4912e60a685a96
-
SHA256
4ab223a4ed0eaced6dc3a2cc74953a453770bb030336f349cd37f2ef24b65c30
-
SHA512
9aec4444247c4f4b8c0a0203dec53abc3fe64de2c2e86de79e57ecd003920d2ffacef90c09afcfdb51e61df98dcc3423feeaa97eade1a6e6854adc8ff10e8b3c
-
SSDEEP
192:8rkrkrErErErErErkrkrErErErErErkrkrErErErErErkrkrErErErErErkrkrE1:2WPE09IvR4
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-