General

  • Target

    18112024_1003_Fluor RFQ1475�pdf.vbs.zip

  • Size

    8KB

  • Sample

    241118-l3gevatpbw

  • MD5

    db8a9327aa708179b87dfb4c5039696a

  • SHA1

    983a487e71cb8eda3936e7dcdf2d4212d6825622

  • SHA256

    57b863d0dc652e27edacd480593bbd3e45ec5a8e9e8208a2ba52d4ecf91c8a17

  • SHA512

    39128a2b7e2ce050771ac688d4fefd7424dfc188341ec4c4cf9bfd1364b8013963073769dd463d727c32d1e178ac6f6352911d3185d4001d5bbcf82403c60139

  • SSDEEP

    192:iG2OGRjzNVKSxc1wdbdLRKN0Esw+TOJycGSeuodf/MjH82rQ:iGgRjzNVK1wbRKPsNMZneJ/yE

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

mtt9kw1mj.duckdns.org:23458

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    true

  • install_flag

    false

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-28YJO8

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      Fluor RFQ1475·pdf.vbs

    • Size

      15KB

    • MD5

      695ec6cd0d4d8abaab5bed4e4f37153d

    • SHA1

      027b2b36b69e9f41bc5b54493533d8b417192255

    • SHA256

      3bb02f08d2d70b6f126d045a385a241330dbe96689304c48f1b9a1958297a060

    • SHA512

      36a68f1693a03903990cf86eafe285cacab31b8b89a2a7c033e06545942604d8c735f4ff4d15d33c77e83379d74064954cd12a5fcb1bc3ea2b6cc289ef63ae1c

    • SSDEEP

      384:aCTCJn/NHU8wde1pmZaKHQtL1YNBcYK7CB7qdgcKU:JuJnFH/w6pmmtl5WB7qm8

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • UAC bypass

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Blocklisted process makes network request

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook accounts

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.