General

  • Target

    1d5136cd83db5f71d6d8b10d43f33009aae773bac34a9ebe365a43ec4e954692

  • Size

    180KB

  • Sample

    240923-n68plswclk

  • MD5

    e7163c953316d40430fbc43eac453cc2

  • SHA1

    46d31f0078cf62860cef4354dc3b27ce70f27633

  • SHA256

    1d5136cd83db5f71d6d8b10d43f33009aae773bac34a9ebe365a43ec4e954692

  • SHA512

    83043aff66e0484d6bf06a7139246747340900bca9e59e70a29b13b6af8601fd8839f78cd6589a067d2eeab4a6a24454a5f1d4148d9556ee6846ac156e1b93e5

  • SSDEEP

    3072:bS+BFuBQciCC0KtCbXD2iTFryoygh3ZkijuJ1aM2bu2hcImO8G2sEkwPQ3gA6lR:bS+KOjGXSiT5yohffg2blhf8G2OwkgAc

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txt

exe.dropper

https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txt

Extracted

Family

remcos

Botnet

444

C2

ella666.duckdns.org:3131

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-T559ZO

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      PASUTIJUMU SARAKSTS 2112100 EUR DOKUMENTS SEPTEMBRIS PASUTIJUMA DOC pdf.vbs

    • Size

      502KB

    • MD5

      054770dd0e6f86d42f8df6f72265375b

    • SHA1

      bd012509b749be9acc1dd0a67b8519dedaf1c680

    • SHA256

      0a6ec56a9d84def4f2898df242f92e2aa9cf1bdf0d32bc0b710f4106bc3de651

    • SHA512

      4b2777eb1ff628dfa9f378879828b4d4f4ae19386108de94584683c2173b70e7347da1d55a8be19bf146576e36f3e6ea70c50ab78aed69689ea8ebf2b71ca9c8

    • SSDEEP

      12288:i6tQjLe5sR1aZdlZ7LVSFOzV3JMGeLF8azIdzzEV3J2m2Fjc1AkhbhBs3r:dY2SyPEED

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks