General
-
Target
FV0900081251054515515,pdf (2).uu
-
Size
7KB
-
Sample
241031-x8tg5strdk
-
MD5
ca6a46ce72ee0b44459c58dda61f0aed
-
SHA1
bdda77bd15a82cae95225f6debb536d47d211932
-
SHA256
0bdccaed550af60f1b8a7ebb690465abe77be4e6c43a99df110d3251ee2fde2b
-
SHA512
70713bf1d9718dcaad8890a85c8e8956f57f8e0c73e2f9dc30504a93939207e9a443f5c1b477bef82a44418e5028de17ed69263a5c741f79cae34e1148fdeed9
-
SSDEEP
192:rSMf/SPvwIghl4lqFWVL9mZ2w0DwrK7ZW0uk:3/QvwIUFW9i0DtrL
Static task
static1
Behavioral task
behavioral1
Sample
FV0900081251054515515,pdf.vbs
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
FV0900081251054515515,pdf.vbs
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://pastebin.com/raw/J6uRjZrv
Extracted
remcos
RemoteHost
remcos2010.duckdns.org:2010
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
registros.dat
-
keylog_flag
false
-
keylog_folder
rmc
-
mouse_option
false
-
mutex
Rmc-E3OCRB
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Capturas de pantalla
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
FV0900081251054515515,pdf.vbs
-
Size
14.3MB
-
MD5
66f97abe5abe9a246eedc33ec848ebe6
-
SHA1
51b7c954bb5cbd218e0de2df14c0d463de62e3e0
-
SHA256
d2d0eb0d42c0c5a8532a6268a05894621b52b354fa0c6a2ee11e575501ac95d5
-
SHA512
f918c78682fb8ace57e2bf62d03546a4ec03a03ee93eb925bbee02bb07f710fec4fc9d128d1efefb3e43f63fb6ce652712a872aff103908cc4e6823cff8356df
-
SSDEEP
1536:lyyyyyyyyyyyyyyyyyyyyyyyryyyyyyyyyyyyyyyyyyyyyyycyyyyyyyyyyyyyyu:mZ5G
-
Remcos family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
1Obfuscated Files or Information
1Command Obfuscation
1