General
-
Target
25112024_0939_URGENTDHLinvoiceSG00101637Adobepdf.vbs.zip
-
Size
8KB
-
Sample
241125-lr59tszrat
-
MD5
17891ef44876b80a505d789f75c2901f
-
SHA1
bd6d92ad5c73e59be46acc77ce6b6a3c6cd9a493
-
SHA256
f31f8fd098463d0161d12babd2e94fc538a8b4db0d59b6dd75961914673aba24
-
SHA512
7806a6121a65b30d7a62f15b4b66ff574664528950ef3169ee29300ad26565a43d26b1662eb932757bbefd015acc4bcf25121e8bd7ea870cfd39de1180946f76
-
SSDEEP
192:gbWKOcL2vhS0ah33NA93V17dvlTRITjbtZB3fzt4EkdGO:gbBAvpQduFNNK/nVfh4r8O
Static task
static1
Behavioral task
behavioral1
Sample
URGENT!! DHL invoice SG00101637 Adobe·pdf.vbs
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
URGENT!! DHL invoice SG00101637 Adobe·pdf.vbs
Resource
win10v2004-20241007-en
Malware Config
Extracted
remcos
RemoteHost
gnsuw4-nsh6-mnsg.duckdns.org:3613
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-8OIXMO
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
URGENT!! DHL invoice SG00101637 Adobe·pdf.vbs
-
Size
15KB
-
MD5
84183b62bf0c860efeaea9604efbfe3a
-
SHA1
4cc58ad007613902ff2118cb7091042f37ba394f
-
SHA256
b4eff9a95f5eeeaee8c4e4a8ce366f478acf9f309e1df6db8a93375045982c5a
-
SHA512
916c80269eec78f3391e67819a3fa9a4a64a52a2e7909c5a2a3f310211e1aba01534a932f6df06df8d70ec0ea7d641c7e5b9b5e527045a6f27b65a128f19a81b
-
SSDEEP
384:WxaWEl8MDBPMpf/X1tBoCPSn5otbq+4Xs4kDyLuoWt:gEl8MDBPy3X7BoBCtbq+4XspDyHWt
-
Remcos family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Blocklisted process makes network request
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook accounts
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Authentication Process
1Modify Registry
2