General

  • Target

    9a551dc7b28ec615c023645b2f7621e5001cc81fcfb7d872983e1f6ad50c71da

  • Size

    19KB

  • Sample

    241127-vl25naymbn

  • MD5

    1276a944f89bfa67d5044dbde3fa1337

  • SHA1

    b9deb7a2780d1da979bd752dd2e1c37ee650b034

  • SHA256

    9a551dc7b28ec615c023645b2f7621e5001cc81fcfb7d872983e1f6ad50c71da

  • SHA512

    ce5c36e8ff8ea2f7cc27dcd3c1976979bb594601ebe57d67c4e8594fb907c60d7c6f679af6382defd6fdb06da1d4da4ed5adb0b8593fcce4450a161fe7e4b49b

  • SSDEEP

    384:aHpYcMC8ODQZa679tiqnDWR5pl8QLwd8M11AfrZ0sAMLyfkSk09BHOuWDW69salE:aHpvMdMIam8qniRb6QcGS6T2BNk0oTsX

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

45hq459.duckdns.org:23458

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-ZP0CQ6

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      SOLICITUD DE PRESUPUESTO 27-11-2024·pdf.vbs

    • Size

      33KB

    • MD5

      3ce766fced81c253e1d82f6fb1897fa0

    • SHA1

      b929522021b4a1c40993c0b51ae9c0f9c76cdca2

    • SHA256

      0ba724668ce99b2a3241ff89f4f83a27fdc7225b400d0abe304f00881a2c7be9

    • SHA512

      e9ddfa767da48747a1670755441ca476192500eb352f2b05b449e8a2f4b3553e9be58bdbdd75d9ecf63f6380faad73d512023bc7355e58931bcb47178046e302

    • SSDEEP

      768:qG9asa0h+BjfPK+fNXQhZUQdOPYVVv6Or90T51SQ/I:b9asKBD/fNQ/Dp6Oh0TfzI

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • UAC bypass

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks