General

  • Target

    15102024_0108_CI+PL_pdf.vbs.zip

  • Size

    5KB

  • Sample

    241015-bhfmpszdkm

  • MD5

    9cc10283ca6aeab66396cb40b137ba68

  • SHA1

    ab87be88e1f6a53cbb40c4a2b9e2f45f664d96cc

  • SHA256

    79d0bf3f338b4836936c5f4e5ddebf1cbf42c03a9f05b218b56164b4ebbce83f

  • SHA512

    34e699b91e372d69a754bf535e4636380a796fcbe5d80dac78b136c2b60e7560706eac9404081ab6ac86b9d2fe2a23eb9883d991aabb0b4af581319e5f0c8a5a

  • SSDEEP

    96:4UymPSNCLSemT4zHw1WM03bhVwH/J8PHZGbVEi+wFfoUlJblmyln:GmmKTmTIQ1lGhVexiGbVE2Fg8Jwyln

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

154.216.18.214:2404

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-AOD6MB

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      CI+PL_pdf.vbs

    • Size

      10KB

    • MD5

      be47cb340cb887096ab69a01c4780227

    • SHA1

      8688904892b6f732ef8df362ad5d0b810de337d0

    • SHA256

      a459a81129cae256a1da0ec67918dbca56d91e95eb26b11bdac7f0c2a82580ec

    • SHA512

      3795692900b0f98be8ca11768446e21b5dae034b43645df3f6388273dea0de4cbbe78a36c56e085b40074ebdf7d5909e511106445527ae509c828be13d001e84

    • SSDEEP

      192:xiJSEyChBpc9D1smsU1VmCIX62aTf3RRBqwBoBVao8jmgwgKBrD:xu1BIRsmsU1Vmu1R8wwgOrD

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook accounts

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks