General
-
Target
18112024_1003_Fluor RFQ1475�pdf.vbs.zip
-
Size
8KB
-
Sample
241118-l3gevatpbw
-
MD5
db8a9327aa708179b87dfb4c5039696a
-
SHA1
983a487e71cb8eda3936e7dcdf2d4212d6825622
-
SHA256
57b863d0dc652e27edacd480593bbd3e45ec5a8e9e8208a2ba52d4ecf91c8a17
-
SHA512
39128a2b7e2ce050771ac688d4fefd7424dfc188341ec4c4cf9bfd1364b8013963073769dd463d727c32d1e178ac6f6352911d3185d4001d5bbcf82403c60139
-
SSDEEP
192:iG2OGRjzNVKSxc1wdbdLRKN0Esw+TOJycGSeuodf/MjH82rQ:iGgRjzNVK1wbRKPsNMZneJ/yE
Static task
static1
Behavioral task
behavioral1
Sample
Fluor RFQ1475·pdf.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Fluor RFQ1475·pdf.vbs
Resource
win10v2004-20241007-en
Malware Config
Extracted
remcos
RemoteHost
mtt9kw1mj.duckdns.org:23458
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-28YJO8
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
Fluor RFQ1475·pdf.vbs
-
Size
15KB
-
MD5
695ec6cd0d4d8abaab5bed4e4f37153d
-
SHA1
027b2b36b69e9f41bc5b54493533d8b417192255
-
SHA256
3bb02f08d2d70b6f126d045a385a241330dbe96689304c48f1b9a1958297a060
-
SHA512
36a68f1693a03903990cf86eafe285cacab31b8b89a2a7c033e06545942604d8c735f4ff4d15d33c77e83379d74064954cd12a5fcb1bc3ea2b6cc289ef63ae1c
-
SSDEEP
384:aCTCJn/NHU8wde1pmZaKHQtL1YNBcYK7CB7qdgcKU:JuJnFH/w6pmmtl5WB7qm8
-
Remcos family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Blocklisted process makes network request
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook accounts
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Authentication Process
1Modify Registry
2