General
-
Target
sostener.vbs
-
Size
1.6MB
-
Sample
240926-h21kjsxbmg
-
MD5
76dc07a863d93237819c1e08c5bb0eef
-
SHA1
fc7e6a1ef7679f7461ae8b34987b46dc118cc4bb
-
SHA256
5e519ab2640c9d1065a0e7610661fcd83e2e38869d48768fcd1b674b3804dd0f
-
SHA512
9538b37d31fcb53e968ce7e69c13166e3f4f16fada79b9bac91ec2de012ed5b2642e6e380591c9716e9ae8d8f1149b7492e06c291bb8ec6a234af47daf95b51e
-
SSDEEP
192:9PmPPPPmPPPPPPGPmPPPPmPPPPPPGPmPPPPmPPPPPPGPmPPPPmPPPPPPGPmPPPP7:IeGsXcpR
Static task
static1
Behavioral task
behavioral1
Sample
sostener.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
sostener.vbs
Resource
win10v2004-20240802-en
Malware Config
Extracted
http://pastebin.com/raw/V9y5Q5vv
Extracted
remcos
RemoteHost
rem0324.duckdns.org:1213
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-WGH0X6
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
sostener.vbs
-
Size
1.6MB
-
MD5
76dc07a863d93237819c1e08c5bb0eef
-
SHA1
fc7e6a1ef7679f7461ae8b34987b46dc118cc4bb
-
SHA256
5e519ab2640c9d1065a0e7610661fcd83e2e38869d48768fcd1b674b3804dd0f
-
SHA512
9538b37d31fcb53e968ce7e69c13166e3f4f16fada79b9bac91ec2de012ed5b2642e6e380591c9716e9ae8d8f1149b7492e06c291bb8ec6a234af47daf95b51e
-
SSDEEP
192:9PmPPPPmPPPPPPGPmPPPPmPPPPPPGPmPPPPmPPPPPPGPmPPPPmPPPPPPGPmPPPP7:IeGsXcpR
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-