General
-
Target
db6d71e880a06ada6f3b1a50b335fc2e59833d965d027211b2b642a8c2f3560d
-
Size
45KB
-
Sample
241112-bs3vzsvkaj
-
MD5
0e929d6be5ee3aa22ae6e6b57322dda6
-
SHA1
69d5a09f730db33065247e822122e836fec93efd
-
SHA256
db6d71e880a06ada6f3b1a50b335fc2e59833d965d027211b2b642a8c2f3560d
-
SHA512
c4b534f52ccda05334ecbcd8a0b37e7970fe7f88967fa5b46d3e9f35633ff6fb1e135ea37a78a4773935c06e01247033f86616aa3927b5199460014c1427f137
-
SSDEEP
768:fUrwC/ceMuP9wi3aflwZmU9vZAsmWAmuYHKniurkL6D4mHPAQJ1aSncmFFd3JcXS:ZzeJ9RKflwZdZIWAMAYiPPVFhWXd6ao
Static task
static1
Behavioral task
behavioral1
Sample
SK 견적요청_울산공장·pdf.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SK 견적요청_울산공장·pdf.vbs
Resource
win10v2004-20241007-en
Malware Config
Extracted
remcos
RemoteHost
13hindi4pistatukoy4tra.duckdns.org:47392
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-7IIE67
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
SK 견적요청_울산공장·pdf.vbs
-
Size
86KB
-
MD5
da79738f51b4a2f265c6817f2db04646
-
SHA1
285cbcc5237b51baa7b93cc7cdae2ff4c08a4806
-
SHA256
fcb85efd53de456d5f743a08f2585d7d54e1a891b7ef8cc768a4a85c9cd3d36d
-
SHA512
aed649f3ae5f8ddf33918a3f8891b85aa1c723b52d04553fca3cf06792861f652dd1bc4b196427c224cbbc526c669d0286e1084a39bbb27bcbeaeee52bfe4667
-
SSDEEP
1536:H70tD9v0kQmGd9pipuoNqCZJlnfsBovNFqq8kuX0NhMfYagy1VRXaAj27DsH4Dt:HQd9vhrU9k5mBov98iNhMfYapVRQDsH+
-
Remcos family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Blocklisted process makes network request
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook accounts
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Authentication Process
1Modify Registry
2