General
-
Target
620846d91db9831c401a6bcfa17d59a216c3aafaa2d4094498e828d0c8e427ac
-
Size
8KB
-
Sample
241118-gp4k1avpbq
-
MD5
2dc4505ad7e049afdc868db931898f0b
-
SHA1
940801f06254179ca70067b674155cef7242e261
-
SHA256
620846d91db9831c401a6bcfa17d59a216c3aafaa2d4094498e828d0c8e427ac
-
SHA512
a2fa4934a48caf71643ef84f969198a65693aeebe2a27a0ea69cc3f18fea552ee6453ad37ac9f1b41a10cf50fe812380ae9f6a6f00c1f510f6bcf03c9a9e2d44
-
SSDEEP
192:cQ1mSbY8yXthRcSEC0R/VJuhxupgBvCu3yXoqunmz2gbpu56dkXfKJQu:cQ5Pydh6HC89Ju3upg88eumraPKSu
Static task
static1
Behavioral task
behavioral1
Sample
Narxlarni so'rash (SOLIS TRACTORS UZBEKISTAN) 2024·pdf.vbs
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Narxlarni so'rash (SOLIS TRACTORS UZBEKISTAN) 2024·pdf.vbs
Resource
win10v2004-20241007-en
Malware Config
Extracted
remcos
RemoteHost
tr2vobvq.duckdns.org:3613
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-4S2GUG
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
Narxlarni so'rash (SOLIS TRACTORS UZBEKISTAN) 2024·pdf.vbs
-
Size
15KB
-
MD5
57a98d83eebfd7536413c107b5561bcd
-
SHA1
ab660a6cdb0bd632e307fb5b69f895df31ef4c67
-
SHA256
1b32b2a0b09264362731fefb3212dd89d0c5a588e202fe8cb0cc07b0612b06ae
-
SHA512
9c985a943bcd416e290374c29619dfd7011450f8d469b3d899de2235a2dd79d2b1eb5d845ea199ecd95f5349f2fec137aab02bc46697f778a8ee95376ce80608
-
SSDEEP
384:YwAAp2YC86mHC6GpbW+lqPIjijLUgZSPDctjjPhnwLCeFFBDq43UVcm9:YopU6OqPy6LUgaGvlwLZFFBD/3UqY
-
Remcos family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Blocklisted process makes network request
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook accounts
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Authentication Process
1Modify Registry
2