General
-
Target
BuiltStub.exe
-
Size
5.1MB
-
Sample
241107-zr9h5sxqfw
-
MD5
f9459b5f142a8f9acd593c54a3d96c81
-
SHA1
0308afb7f63eceac4c83ec8d1f9c377b027b81be
-
SHA256
e014eb99de60b913905f2a6c4267f663c36beee4ef35df66e8ca7f372b871b9b
-
SHA512
7f4e632b5d4f4718e081c0c2fb59af8dae928880193565b786a8ac870b77e9be9a4aab10f8d1172093671ee45d187fa81a4c369a1fb5d9e46477b7e033eb862e
-
SSDEEP
49152:YxF/k4/9svPpW78mZEm62L9RiBx4xpqeWK+0dr5Efn7qbZp5m6XH:LXpYaR4xc4Ee9pw8
Static task
static1
Behavioral task
behavioral1
Sample
BuiltStub.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
BuiltStub.exe
Resource
win11-20241007-en
Malware Config
Extracted
remcos
RemoteHost
194.59.31.143:4444
-
audio_folder
Random
-
audio_path
%SystemDrive%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
DirectX.exe
-
copy_folder
DirectX
-
delete_file
true
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
false
-
install_path
%SystemDrive%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
Root
-
keylog_path
%SystemDrive%
-
mouse_option
false
-
mutex
Rmc-BGWZJ0
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
- startup_value
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
BuiltStub.exe
-
Size
5.1MB
-
MD5
f9459b5f142a8f9acd593c54a3d96c81
-
SHA1
0308afb7f63eceac4c83ec8d1f9c377b027b81be
-
SHA256
e014eb99de60b913905f2a6c4267f663c36beee4ef35df66e8ca7f372b871b9b
-
SHA512
7f4e632b5d4f4718e081c0c2fb59af8dae928880193565b786a8ac870b77e9be9a4aab10f8d1172093671ee45d187fa81a4c369a1fb5d9e46477b7e033eb862e
-
SSDEEP
49152:YxF/k4/9svPpW78mZEm62L9RiBx4xpqeWK+0dr5Efn7qbZp5m6XH:LXpYaR4xc4Ee9pw8
-
Remcos family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Executes dropped EXE
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Authentication Process
1Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1