General
-
Target
Документи.zip
-
Size
11KB
-
Sample
241010-nrwfqsvdmg
-
MD5
1b20b7aea59b6493ac5be562800667f5
-
SHA1
9444fe6caec824e28add10b834561b1658f5e858
-
SHA256
0c96359b10b505830decc2c11ed165479af4f89f46c0994428833100e5195cbc
-
SHA512
ab690b554b25be706e77f30262498742435836fcb2a6aca4d2123d49825e4e3b86b477b658094cab7679ce76252ee7013ca83e8195428f43a2f4afe8a13b013c
-
SSDEEP
192:PLylK9xnw7BD2NR1X0paH87XzJPH8STVE20K2mSyeQSrAtYk1qja:2Mjw7B67hYHBhEu2mSaqA+cR
Static task
static1
Behavioral task
behavioral1
Sample
Документи.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
Документи.bat
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
Документи.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
Документи.vbs
Resource
win11-20241007-en
Malware Config
Extracted
remcos
host_one
101.99.94.69:2404
101.99.94.69:8090
101.99.94.69:44444
101.99.94.69:80
101.99.94.69:21
101.99.94.69:4899
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
rmc
-
mouse_option
false
-
mutex
Rmc-UP4CTA
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
Документи.bat
-
Size
13KB
-
MD5
4303710398af710fc8acfa7a732aafbd
-
SHA1
42847713dd9c5313831656894505063c4949a018
-
SHA256
0a2b1844b3ef7454a977db405d7b86cac2cf6e93cd09773db843290f1e9f0d97
-
SHA512
d9d88afbfd28a3b0d422be566ba1113e8c21d3d82b32c611800536ef67eb0b9c06392b4d4413b8174b489be56ec0dd1e9ffadb991f197a0336fa1b3937c2001a
-
SSDEEP
192:OqDZujXdVzn3qxkk5Eno3vvb17652yVjjG/tw+qNbgAcnjz9qjgZn5:ZsjtZnzxn0vb17MNu4B8jcEX
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
Suspicious use of SetThreadContext
-
-
-
Target
Документи.vbs
-
Size
15KB
-
MD5
f38ba7aa784bb8bcc526ecd9c6953bed
-
SHA1
f32b215e22d5a7728b2bc2be84f3697e33126f13
-
SHA256
2837b1cfc87c988e5475f47e4c9f146eb4094e192eebc91c4171d62a60735cd3
-
SHA512
729adffc803b7ec7c8202e731b81a9c79bdb361a59e9bc1d250e7831c801de6ea3e2b0ff3e0a6d8dadb3f5d406242d128273c473b3074ceb2096a52fbd9e5de8
-
SSDEEP
192:sWZsOMqxnDxLInuYCWGHn5qg/tyZdG97qwYVLtGcGPJZMxu2hlYF9WBMDxpnO/9m:sBO9xLIuLWGHnD0QWVLQPJmxNSiMFpWm
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1