General
-
Target
27ab626711706fe4699ec17a7d7e0cd6aa2181ac87d7693cf55ef728242d4181.vbe
-
Size
11KB
-
Sample
241121-ege7bsylgw
-
MD5
df045c185b46e8c2432ea266b0671f86
-
SHA1
db27134d7be95240a1349bbcd1a1dcfa0dfb3506
-
SHA256
27ab626711706fe4699ec17a7d7e0cd6aa2181ac87d7693cf55ef728242d4181
-
SHA512
99306cbf23bf7a00a398849ca8ff25ce9ab1659f686e28e3e843b1a1632637495c177044173e70ad58571e2d856f4aa4e4b22b2e48e9a8cc3944feabeb4e11ae
-
SSDEEP
192:1P3nxwOrFEWWm60w5HPZMy35kCktIFc/T+zxLQkQUYUu59ynvT/1dut4VXcz1Xzy:9pJEWM08HRdyCHFsaFQkQUYhivZktOMc
Static task
static1
Behavioral task
behavioral1
Sample
27ab626711706fe4699ec17a7d7e0cd6aa2181ac87d7693cf55ef728242d4181.vbe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
27ab626711706fe4699ec17a7d7e0cd6aa2181ac87d7693cf55ef728242d4181.vbe
Resource
win10v2004-20241007-en
Malware Config
Extracted
remcos
RemoteHost
gnsuw4-nsh6-mnsg.duckdns.org:3613
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-8OIXMO
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
27ab626711706fe4699ec17a7d7e0cd6aa2181ac87d7693cf55ef728242d4181.vbe
-
Size
11KB
-
MD5
df045c185b46e8c2432ea266b0671f86
-
SHA1
db27134d7be95240a1349bbcd1a1dcfa0dfb3506
-
SHA256
27ab626711706fe4699ec17a7d7e0cd6aa2181ac87d7693cf55ef728242d4181
-
SHA512
99306cbf23bf7a00a398849ca8ff25ce9ab1659f686e28e3e843b1a1632637495c177044173e70ad58571e2d856f4aa4e4b22b2e48e9a8cc3944feabeb4e11ae
-
SSDEEP
192:1P3nxwOrFEWWm60w5HPZMy35kCktIFc/T+zxLQkQUYUu59ynvT/1dut4VXcz1Xzy:9pJEWM08HRdyCHFsaFQkQUYhivZktOMc
-
Remcos family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Blocklisted process makes network request
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook accounts
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Authentication Process
1Modify Registry
2