General
-
Target
11112024_1311_10112024_索取報價 11-11-2024·pdf.zip
-
Size
46KB
-
Sample
241111-qe1k2azemb
-
MD5
61daea16300ff38aa505c9bdc6ce4f30
-
SHA1
3c3a4579c8bb448cd5a7cf3fc49ab68eb2a7aa72
-
SHA256
35e47291a618a097a45afd6019da44d6959658db64bc8d8d6cc1653520fc6b56
-
SHA512
284bb180ceb52aec6381bb1b73689f01f09bff15676dc618725c3a7c427eef399d1ac7593a8a28ef3ff7360f977cb6a0be5a8f20348ef5d725f80d80f31cac9f
-
SSDEEP
768:GnnZxAixfpO7dKYVOk0SnK5glaLj3rjRJlUhKBABmBhM2YbFEoSucMnVLz/:YAIhWTowTgDHDOhIDGwknVLz
Static task
static1
Behavioral task
behavioral1
Sample
Request for Quotation 11-11-2024·pdf.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Request for Quotation 11-11-2024·pdf.vbs
Resource
win10v2004-20241007-en
Malware Config
Extracted
remcos
RemoteHost
t-vw8qw3d.duckdns.org:23458
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-OFN57D
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
Request for Quotation 11-11-2024·pdf.vbs
-
Size
86KB
-
MD5
b395f7c166e901cbb3d4560021b62f1e
-
SHA1
2ec42e99d3e040aa5dba198b6a258191a7abfd71
-
SHA256
980d0b7857091bbaecb3cd4783a4d7ed19548cd63bf8f244e2b0ea7c10812c53
-
SHA512
aa7de85f408873ddda3b27a7d716d7617cae31e5c18986815cc2bb496e7b716bbb9734c9dca4d1e1e7bf7539a7afac6e5f3af50b0174fb5dd4478e749a1fe581
-
SSDEEP
1536:G70tx9F0kevGd9pnpuoNfXuJsAvsxpuqkkZEfXTjSBVYt3gt1V9XaAj2/L/uqlG:GQH9FhQU9JMLkxHkfvTWBVYd8V98LmT
-
Remcos family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Blocklisted process makes network request
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook accounts
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Authentication Process
1Modify Registry
2