General
-
Target
11112024_1259_detalhe_fatura_20241105�pd.vbs.zip
-
Size
46KB
-
Sample
241111-p77dlszdmh
-
MD5
42d7980824f16ee04ed159cf15870747
-
SHA1
3d66f48b681bda9909f826e974b3f7ef7e714f4a
-
SHA256
2afec0327c04e9ee4fd90742849759324292c2b905a5e4d4444bb08275b408ab
-
SHA512
4b178f1ae347157509e77b9fc6c4d2517995e9e928a2ffa7e3382934c87295a8f131f1c7cef76c68cf20445a28588ccbbceed20ba091ffe52c94d0a321deac87
-
SSDEEP
768:VP34QSoZMH++8dDhR301v8CxVEoFawSLN6ZgqrbrVeAD336APLWSDe8W1cq:VP345oZMe+8Lc8CkJXN6ZgqrVZ33HLD6
Static task
static1
Behavioral task
behavioral1
Sample
detalhe_fatura_20241105·pd.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
detalhe_fatura_20241105·pd.vbs
Resource
win10v2004-20241007-en
Malware Config
Extracted
remcos
RemoteHost
dvlqrd8dhs.duckdns.org:46063
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-0IGFAQ
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
detalhe_fatura_20241105·pd.vbs
-
Size
86KB
-
MD5
fa7fccd9c64eca0c04656fd07f024210
-
SHA1
4a23446d493248bef140758963caf4a09a8d3a71
-
SHA256
c35e36a8c15cc7ab1b6b541a11a8fc9c33602d34af95722936197e7c1b9180e9
-
SHA512
ba3c56aef48c84127bc22976326c276e92eb35d0c580ca9565de8f2037edb11af2ba868dccc17b60ac40944eda7c5f246c079de6101680692762f7220fa53333
-
SSDEEP
1536:Q70tl9B0k4NGd9pfpuoNa90JvYsnlLKhuqgk4tFmK/WYcgI1V8XaAj2VYEHMhC:QQP9Bh+U9RFjxKTgnTmK/WYc3V8kYEHt
-
Remcos family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Blocklisted process makes network request
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook accounts
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Authentication Process
1Modify Registry
2