General

  • Target

    Label_PL001292992.vbs

  • Size

    509KB

  • Sample

    240917-rdvh3awgre

  • MD5

    2ed45f6abaeb502d6ff4d23237566c94

  • SHA1

    d284892891b5f51bc38225e9e5facbbaaff5e714

  • SHA256

    cfe9d1eca804cfb9d54224474dd7e71a2ee2b19d3b721728bd9e8ec326c5594f

  • SHA512

    4e2ef24f5bd791fb9e457c17f7224358bf2c34d4831b1af4929d3f144284ac52c1828b6c4df2342738e878ba80e80a16ec18592fab258ddd8e6c1fd143f0bfaa

  • SSDEEP

    12288:ZFQtuemF7ZN1OFvOuozQnL8ZoaoBIonqqzUSOEUDYTXnnvxwKt+MmBsHHG6LiF/O:CNNwqunWp

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txt

exe.dropper

https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txt

Extracted

Family

remcos

Botnet

RemoteHost

C2

remcosco222.duckdns.org:7877

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-FX5B2Y

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      Label_PL001292992.vbs

    • Size

      509KB

    • MD5

      2ed45f6abaeb502d6ff4d23237566c94

    • SHA1

      d284892891b5f51bc38225e9e5facbbaaff5e714

    • SHA256

      cfe9d1eca804cfb9d54224474dd7e71a2ee2b19d3b721728bd9e8ec326c5594f

    • SHA512

      4e2ef24f5bd791fb9e457c17f7224358bf2c34d4831b1af4929d3f144284ac52c1828b6c4df2342738e878ba80e80a16ec18592fab258ddd8e6c1fd143f0bfaa

    • SSDEEP

      12288:ZFQtuemF7ZN1OFvOuozQnL8ZoaoBIonqqzUSOEUDYTXnnvxwKt+MmBsHHG6LiF/O:CNNwqunWp

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks