General

  • Target

    4e0fc15a0517d679c24f6ab482f1654f29bb736bb028c8c119358d3dfa64a414.zip

  • Size

    4KB

  • Sample

    240911-b6a25axeja

  • MD5

    919e62a30b23609426f1ba469bb8c709

  • SHA1

    e1621f797f0c9be22a83ba30dcda43bd57963922

  • SHA256

    4e0fc15a0517d679c24f6ab482f1654f29bb736bb028c8c119358d3dfa64a414

  • SHA512

    2b79655a1603c32c041d9e73c64a27d0ffa3d5cd8ce47905177b11c211a45a88e67a1bc7fcf6c5087b2dd7da19b9140364728c7826eb9fbc77d7994904b9bb5c

  • SSDEEP

    96:gAL55oeloiAQ26t3OgVjEROkZx0xFImhcVUXs2kfo8Q8Ri:bdoRxUfr38Y

Malware Config

Extracted

Family

remcos

Botnet

Bundle$$

C2

iwarsut775laudrye2.duckdns.org:57484

iwarsut775laudrye2.duckdns.org:57483

iwarsut775laudrye3.duckdns.org:57484

hjnourt38haoust1.duckdns.org:57484

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    true

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    sfvnspt.dat

  • keylog_flag

    false

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    shietgtst-RX5FWO

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      rfq_final_product_purchase_order_import_list_10_09_2024_00000024.cmd

    • Size

      6KB

    • MD5

      f7ba2a252aad41953101bc4032d650ee

    • SHA1

      9647596c54892c99981179267b193da9643aa839

    • SHA256

      842c000429c7e5787fb9fd0961238758e04b4af6c6b56dc4bb0c4db27af69fce

    • SHA512

      1a33c465faa62a5397eab362912967b25604cb8320e2ec5faf44374bc161d054b1e0e217100fbdea331b9114e4221e689531b46fd7b435020a7af43d28a98682

    • SSDEEP

      192:VQW8A6936logZZQlXtVaEGmpQnYHZYya0wb7:6E6pGZ59mOnYfaXb7

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks