General
-
Target
ce47d649ae973ea63f08e678367e58a90fdda8304e1ca930b232dcb1ea29784e
-
Size
8KB
-
Sample
241118-ae6jaasqht
-
MD5
0bf91ed2bc9c044467854a4d9b553acc
-
SHA1
9e5615cc5303697784031052a95aaea1c240f996
-
SHA256
ce47d649ae973ea63f08e678367e58a90fdda8304e1ca930b232dcb1ea29784e
-
SHA512
36010b4c2f41bb32d48138311ee8a8f7eb0bc680b6c98fa156e7ac97e732413a3a60cbc512ea123c4c5e3983afcb488176a68554c2784414c466e7803c321aeb
-
SSDEEP
96:buZ8ur15TLkUvb3Wi+v439vZfTymn+DKasB3qvbS8mfr23otdG/xAd/SgKtmlDaR:C8u3Db3WHEh1nmKasbY0YpAkVmBa1nz
Static task
static1
Behavioral task
behavioral1
Sample
[SK하이닉스 ] 2024년 하반기 협력사 예비조사표.vbs
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
[SK하이닉스 ] 2024년 하반기 협력사 예비조사표.vbs
Resource
win10v2004-20241007-en
Malware Config
Extracted
remcos
RemoteHost
xmrhgsptl.ddns.net:47392
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-84A707
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
[SK하이닉스 ] 2024년 하반기 협력사 예비조사표.vbs
-
Size
15KB
-
MD5
ecdc2bdc4b6797e46ba636a37e9f4dc9
-
SHA1
46c1326fcad9f2081169a8e204108d9987d3140b
-
SHA256
aa39f9573531ad0822df9283582e801e104119339b4bc9553feac79f4c9da435
-
SHA512
323da981a911a54bfeb56e76a0cd8899c74dbce07682f381f9ea3974b8f5c1a2a3c4563feabf67085da5317b69216e3beefad16b7cb1b357eae46f6faaf399ed
-
SSDEEP
384:8aEIukP7IsT0LanTOfEia9SLFrA3BY99uN7yrkC:BBTIsguTOfi9SRrIY3ubC
-
Remcos family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3