General
-
Target
c2efd467a5a52d2ed84d765cf004c8fab1f4fdf714feae96b7f4b6adaf5bd793.vbs
-
Size
483KB
-
Sample
241002-bzlv2s1apl
-
MD5
f263136dd6f26628d6e5fbc4f52f1c0a
-
SHA1
294f56a012b9a3567ffd4b49a348a68cc64c73f8
-
SHA256
c2efd467a5a52d2ed84d765cf004c8fab1f4fdf714feae96b7f4b6adaf5bd793
-
SHA512
3b728b0b0014125f23b8dfb5a7c06a6293a301971b127474bfbd59a96b4528123e0081cd90989e41bd5e5be8b04f4cf465a385fe637b4f0368344206d5c1aca5
-
SSDEEP
12288:RGMsp3SuzEPHa8ZVVCRl0pzCwxn9Ki+GtW2r7aPZy6PLAAIbgTNixeQJbkLFjOnd:RGNQ7H+xC99
Static task
static1
Behavioral task
behavioral1
Sample
c2efd467a5a52d2ed84d765cf004c8fab1f4fdf714feae96b7f4b6adaf5bd793.vbs
Resource
win7-20240903-en
Malware Config
Extracted
remcos
INRY
025sep.duckdns.org:3000
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
registros.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-Q0TS8L
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Capturas de pantalla
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
c2efd467a5a52d2ed84d765cf004c8fab1f4fdf714feae96b7f4b6adaf5bd793.vbs
-
Size
483KB
-
MD5
f263136dd6f26628d6e5fbc4f52f1c0a
-
SHA1
294f56a012b9a3567ffd4b49a348a68cc64c73f8
-
SHA256
c2efd467a5a52d2ed84d765cf004c8fab1f4fdf714feae96b7f4b6adaf5bd793
-
SHA512
3b728b0b0014125f23b8dfb5a7c06a6293a301971b127474bfbd59a96b4528123e0081cd90989e41bd5e5be8b04f4cf465a385fe637b4f0368344206d5c1aca5
-
SSDEEP
12288:RGMsp3SuzEPHa8ZVVCRl0pzCwxn9Ki+GtW2r7aPZy6PLAAIbgTNixeQJbkLFjOnd:RGNQ7H+xC99
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-