General

  • Target

    11112024_0717_PERMINTAAN ANGGARAN (Universitas IPB) ID177888_pdf.vbs.zip

  • Size

    46KB

  • Sample

    241111-h4t6jsvkbv

  • MD5

    db2bbf2b4889980c7eeac3254fa0f2f8

  • SHA1

    9165e8ee273f0b1a52062d4466a60cc9fa4527f0

  • SHA256

    d7ea8908f53391d47f6ecf1e6bb8b30d03b0abb4c77f688d03920ceeeda66812

  • SHA512

    a0a4014f344e3a7306d4eaa6ff3b8adae8a5785154095e10360001dc1ac14a80a806a9497cfcd456b32bcd3d07691c93a038a3bf5fbdf37f36d6f2cbd212d7cd

  • SSDEEP

    768:rjezoq2KPZd5Kcq8JGn0WdJgNoBna8j6W4Is5TIhuc1bv5XLEPV6GXM1Dvd7VoJq:rjez52KPTkj8JGn0W4oBvgIacMc1bv59

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

dvlqrd8dhs.duckdns.org:46063

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    true

  • install_flag

    false

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-0IGFAQ

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      PERMINTAAN ANGGARAN (Universitas IPB) ID177888·pdf.vbs

    • Size

      85KB

    • MD5

      736c66558711ee1a2cbf31dd7a30f618

    • SHA1

      8068ed77dbf5b384bf4b36a495bc867fefcc6ed8

    • SHA256

      fbfdf6aee524001b40e5aa011341036a9cfc804c7e328b6cae691de62fff59c3

    • SHA512

      d8bb2933affb1054813b978f54d621d80a5bfe113d3de25706f251673288a49447539f871683fcd8aaaaecf7f73c1975bec55cf411cbaffc9b29555952682f5c

    • SSDEEP

      1536:o70tN910kK4Gd9pzpuoNay2kJtvSgsJUqtkkyCX+7oYLgR1VCXaAj2DexCmG:oQP91hbU9NeatvST1tgCXWoYLEVCgexa

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • UAC bypass

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Blocklisted process makes network request

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook accounts

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks