General
-
Target
92dbf37835455cd68d10e5cf6f750ec2d72de8ec7b8d92ffb751f7ceb8653523.vbs
-
Size
15KB
-
Sample
241105-ejch8atkbz
-
MD5
55c8ee8061b9a47f8f6e66b3e8af9f6a
-
SHA1
a8d0c9f6bea7fc5c13dfe86c5beca52457dd6a3c
-
SHA256
92dbf37835455cd68d10e5cf6f750ec2d72de8ec7b8d92ffb751f7ceb8653523
-
SHA512
84cb1f3b8063dedff0ffcce545eb96a0411341e924d22088a1a63ad6c2c45a8980718b881f8fb323cd2c7a01618daed6da610a018c4ac2e45640e7b15b69cb90
-
SSDEEP
384:qbURUoc1vcM7vqGgTUIk0AZl5UYQdRmFhqm5pd:0KJ0GV7U5crm7qYpd
Static task
static1
Behavioral task
behavioral1
Sample
92dbf37835455cd68d10e5cf6f750ec2d72de8ec7b8d92ffb751f7ceb8653523.vbs
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
92dbf37835455cd68d10e5cf6f750ec2d72de8ec7b8d92ffb751f7ceb8653523.vbs
Resource
win10v2004-20241007-en
Malware Config
Extracted
remcos
RemoteHost
ris4sts8yan0i.duckdns.org:23458
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-LAZAF7
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
92dbf37835455cd68d10e5cf6f750ec2d72de8ec7b8d92ffb751f7ceb8653523.vbs
-
Size
15KB
-
MD5
55c8ee8061b9a47f8f6e66b3e8af9f6a
-
SHA1
a8d0c9f6bea7fc5c13dfe86c5beca52457dd6a3c
-
SHA256
92dbf37835455cd68d10e5cf6f750ec2d72de8ec7b8d92ffb751f7ceb8653523
-
SHA512
84cb1f3b8063dedff0ffcce545eb96a0411341e924d22088a1a63ad6c2c45a8980718b881f8fb323cd2c7a01618daed6da610a018c4ac2e45640e7b15b69cb90
-
SSDEEP
384:qbURUoc1vcM7vqGgTUIk0AZl5UYQdRmFhqm5pd:0KJ0GV7U5crm7qYpd
-
Remcos family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Blocklisted process makes network request
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook accounts
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Authentication Process
1Modify Registry
2