General
-
Target
05112024_0115_EE85716273�pdf.vbs.zip
-
Size
8KB
-
Sample
241105-bmfs9stncq
-
MD5
bdab866d9f4a8a483b192078b8fe6284
-
SHA1
453663ac88aa7dc0c0f9c6a8669dc0885bfd07e5
-
SHA256
229b7b535ad988d6608f0122024724354fb1235dcc7cf280170e0ab4155fa739
-
SHA512
9d1343456b2a4b4460b5f385a0974abe0a0283921eaf2eb44d6b54d7cb0025ba1a1ac5a61dd83257ecbcee6748d1cb6f227217957ce25c776c7036a2a54c472d
-
SSDEEP
192:G7jnnIw/O4oJtNDOGutPEX4LRy+tKo9bPg2mVvn7F2mcz:GPnv/gT/u68Ry4KoVG7F2jz
Static task
static1
Behavioral task
behavioral1
Sample
EE85716273·pdf.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
EE85716273·pdf.vbs
Resource
win10v2004-20241007-en
Malware Config
Extracted
remcos
RemoteHost
ris4sts8yan0i.duckdns.org:23458
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-LAZAF7
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
EE85716273·pdf.vbs
-
Size
15KB
-
MD5
dd2dbf4aaf7ccc943b82dda51afc985e
-
SHA1
61a75176fefa4be72f5978319116722396a0e919
-
SHA256
f592c9039e109241cbfd30ae6b0ec2c1098b10ca1dfa80eb427edea6564265f5
-
SHA512
bcaaeeb59703067a86e59d94323f20347ca047c54658baf2dd4f50101a089b63407de4654138ed6dcf46a664cac0f5724322d9db86e4167d1e61b09db4a97f32
-
SSDEEP
384:9b7o6mutReVkQRfjj+3auNjYKv5QN+pBcXg:ds6muSfe3auhYKuMpB7
-
Remcos family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Blocklisted process makes network request
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook accounts
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Authentication Process
1Modify Registry
2