General

  • Target

    11112024_1259_detalhe_fatura_20241105�pd.vbs.zip

  • Size

    46KB

  • Sample

    241111-p77dlszdmh

  • MD5

    42d7980824f16ee04ed159cf15870747

  • SHA1

    3d66f48b681bda9909f826e974b3f7ef7e714f4a

  • SHA256

    2afec0327c04e9ee4fd90742849759324292c2b905a5e4d4444bb08275b408ab

  • SHA512

    4b178f1ae347157509e77b9fc6c4d2517995e9e928a2ffa7e3382934c87295a8f131f1c7cef76c68cf20445a28588ccbbceed20ba091ffe52c94d0a321deac87

  • SSDEEP

    768:VP34QSoZMH++8dDhR301v8CxVEoFawSLN6ZgqrbrVeAD336APLWSDe8W1cq:VP345oZMe+8Lc8CkJXN6ZgqrVZ33HLD6

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

dvlqrd8dhs.duckdns.org:46063

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    true

  • install_flag

    false

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-0IGFAQ

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      detalhe_fatura_20241105·pd.vbs

    • Size

      86KB

    • MD5

      fa7fccd9c64eca0c04656fd07f024210

    • SHA1

      4a23446d493248bef140758963caf4a09a8d3a71

    • SHA256

      c35e36a8c15cc7ab1b6b541a11a8fc9c33602d34af95722936197e7c1b9180e9

    • SHA512

      ba3c56aef48c84127bc22976326c276e92eb35d0c580ca9565de8f2037edb11af2ba868dccc17b60ac40944eda7c5f246c079de6101680692762f7220fa53333

    • SSDEEP

      1536:Q70tl9B0k4NGd9pfpuoNa90JvYsnlLKhuqgk4tFmK/WYcgI1V8XaAj2VYEHMhC:QQP9Bh+U9RFjxKTgnTmK/WYc3V8kYEHt

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • UAC bypass

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Blocklisted process makes network request

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook accounts

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks