General
-
Target
a32cdb962eeaaf9f445636b5c5371300d0f33676a904841232c42823e924adf6.rar
-
Size
8KB
-
Sample
241105-encpsatgpe
-
MD5
021f65591b95c6f25627b348946308fc
-
SHA1
6120367ad12bf4a091809acce3d31149611ae90d
-
SHA256
a32cdb962eeaaf9f445636b5c5371300d0f33676a904841232c42823e924adf6
-
SHA512
e123c9bc0c727652acdc48c7a329bda49745d8ece1c706fff909716039b5593483d25e606b555f9bd0166bed776c3004344e78839cb77a4307b53cc6c94aeae7
-
SSDEEP
192:Zcuyc67+Mb35ni3A4WUdXzHgj42hU9m3GIPNSf4UQADc8:Suu+MuaUdXzAk2h/3G0Uf4Pr8
Static task
static1
Behavioral task
behavioral1
Sample
Solicitați comanda p78460.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Solicitați comanda p78460.vbs
Resource
win10v2004-20241007-en
Malware Config
Extracted
remcos
RemoteHost
6dp5nq4du.duckdns.org:2852
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-M09H81
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
Solicitați comanda p78460.vbs
-
Size
14KB
-
MD5
c80bf6e7394bfdb6d31aef11b1e31b68
-
SHA1
88b6b74da0a06427ec9e502378ea374cfdd0afea
-
SHA256
36b44229a81fa005512ea72195083c77844fbd5339c7afb9eaea4505774c1753
-
SHA512
0df5a54efc36aedae60888c7c241da206e9755db164a18e4bdd969bbd0b4b88b1b8474d6749ceba540d75c0b189964db3ff4989f6acf4f397b7a4642a52a92cf
-
SSDEEP
192:4FbstrlpW7xBpgpnvxLPj8xNbBzLS+cr7rSF9rqQRiHu2lXU8sIOmfSZzx+Xn:SbO6pgpnvlk578WF9rfGSvn5kXn
-
Remcos family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Blocklisted process makes network request
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook accounts
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Authentication Process
1Modify Registry
2