General
-
Target
9a551dc7b28ec615c023645b2f7621e5001cc81fcfb7d872983e1f6ad50c71da
-
Size
19KB
-
Sample
241127-vg7jksskfv
-
MD5
1276a944f89bfa67d5044dbde3fa1337
-
SHA1
b9deb7a2780d1da979bd752dd2e1c37ee650b034
-
SHA256
9a551dc7b28ec615c023645b2f7621e5001cc81fcfb7d872983e1f6ad50c71da
-
SHA512
ce5c36e8ff8ea2f7cc27dcd3c1976979bb594601ebe57d67c4e8594fb907c60d7c6f679af6382defd6fdb06da1d4da4ed5adb0b8593fcce4450a161fe7e4b49b
-
SSDEEP
384:aHpYcMC8ODQZa679tiqnDWR5pl8QLwd8M11AfrZ0sAMLyfkSk09BHOuWDW69salE:aHpvMdMIam8qniRb6QcGS6T2BNk0oTsX
Static task
static1
Behavioral task
behavioral1
Sample
SOLICITUD DE PRESUPUESTO 27-11-2024·pdf.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SOLICITUD DE PRESUPUESTO 27-11-2024·pdf.vbs
Resource
win10v2004-20241007-en
Malware Config
Extracted
remcos
RemoteHost
45hq459.duckdns.org:23458
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-ZP0CQ6
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
SOLICITUD DE PRESUPUESTO 27-11-2024·pdf.vbs
-
Size
33KB
-
MD5
3ce766fced81c253e1d82f6fb1897fa0
-
SHA1
b929522021b4a1c40993c0b51ae9c0f9c76cdca2
-
SHA256
0ba724668ce99b2a3241ff89f4f83a27fdc7225b400d0abe304f00881a2c7be9
-
SHA512
e9ddfa767da48747a1670755441ca476192500eb352f2b05b449e8a2f4b3553e9be58bdbdd75d9ecf63f6380faad73d512023bc7355e58931bcb47178046e302
-
SSDEEP
768:qG9asa0h+BjfPK+fNXQhZUQdOPYVVv6Or90T51SQ/I:b9asKBD/fNQ/Dp6Oh0TfzI
-
Remcos family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Blocklisted process makes network request
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook accounts
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Authentication Process
1Modify Registry
2