General
-
Target
11112024_0717_PERMINTAAN ANGGARAN (Universitas IPB) ID177888_pdf.vbs.zip
-
Size
46KB
-
Sample
241111-h4t6jsvkbv
-
MD5
db2bbf2b4889980c7eeac3254fa0f2f8
-
SHA1
9165e8ee273f0b1a52062d4466a60cc9fa4527f0
-
SHA256
d7ea8908f53391d47f6ecf1e6bb8b30d03b0abb4c77f688d03920ceeeda66812
-
SHA512
a0a4014f344e3a7306d4eaa6ff3b8adae8a5785154095e10360001dc1ac14a80a806a9497cfcd456b32bcd3d07691c93a038a3bf5fbdf37f36d6f2cbd212d7cd
-
SSDEEP
768:rjezoq2KPZd5Kcq8JGn0WdJgNoBna8j6W4Is5TIhuc1bv5XLEPV6GXM1Dvd7VoJq:rjez52KPTkj8JGn0W4oBvgIacMc1bv59
Static task
static1
Behavioral task
behavioral1
Sample
PERMINTAAN ANGGARAN (Universitas IPB) ID177888·pdf.vbs
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
PERMINTAAN ANGGARAN (Universitas IPB) ID177888·pdf.vbs
Resource
win10v2004-20241007-en
Malware Config
Extracted
remcos
RemoteHost
dvlqrd8dhs.duckdns.org:46063
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-0IGFAQ
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
PERMINTAAN ANGGARAN (Universitas IPB) ID177888·pdf.vbs
-
Size
85KB
-
MD5
736c66558711ee1a2cbf31dd7a30f618
-
SHA1
8068ed77dbf5b384bf4b36a495bc867fefcc6ed8
-
SHA256
fbfdf6aee524001b40e5aa011341036a9cfc804c7e328b6cae691de62fff59c3
-
SHA512
d8bb2933affb1054813b978f54d621d80a5bfe113d3de25706f251673288a49447539f871683fcd8aaaaecf7f73c1975bec55cf411cbaffc9b29555952682f5c
-
SSDEEP
1536:o70tN910kK4Gd9pzpuoNay2kJtvSgsJUqtkkyCX+7oYLgR1VCXaAj2DexCmG:oQP91hbU9NeatvST1tgCXWoYLEVCgexa
-
Remcos family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Blocklisted process makes network request
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook accounts
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Authentication Process
1Modify Registry
2