General
-
Target
018292540-SuratTeguranPPI-20230814215304.PDF
-
Size
2.1MB
-
Sample
241113-asxhjatfpq
-
MD5
e3d0f03ab192e8872b4f55f1adce1269
-
SHA1
61546d9f65507e4e3eb880d661a1a4b4f741ac1f
-
SHA256
19ea9d81975410116f668db902265e8e3c3381655692de707aa1b37ab84484c1
-
SHA512
91ba2094d5c5c94601e60bf561f67c91872349da9e363e065ff2d65af0f9812b96a3920c3a6cbaf6580cdb676873ddbfa1aa2c7402449985f7a490a8edefd7f5
-
SSDEEP
24576:I6cblZYtHi+WrePAlb8UNtlD211TLIgXx:I6cblZOC+3PgdKzTLIgh
Static task
static1
Malware Config
Extracted
remcos
Host
oyo.work.gd:3142
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
vlc
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
pdf
-
mouse_option
false
-
mutex
jkm-I9KENP
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
ios
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
018292540-SuratTeguranPPI-20230814215304.PDF
-
Size
2.1MB
-
MD5
e3d0f03ab192e8872b4f55f1adce1269
-
SHA1
61546d9f65507e4e3eb880d661a1a4b4f741ac1f
-
SHA256
19ea9d81975410116f668db902265e8e3c3381655692de707aa1b37ab84484c1
-
SHA512
91ba2094d5c5c94601e60bf561f67c91872349da9e363e065ff2d65af0f9812b96a3920c3a6cbaf6580cdb676873ddbfa1aa2c7402449985f7a490a8edefd7f5
-
SSDEEP
24576:I6cblZYtHi+WrePAlb8UNtlD211TLIgXx:I6cblZOC+3PgdKzTLIgh
-
Remcos family
-
Looks for VirtualBox Guest Additions in registry
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
4Virtualization/Sandbox Evasion
2