General
-
Target
28112024_1733_28112024_ŽIADOSŤ O ROZPOČET 28.11.2024·pdf.zip
-
Size
19KB
-
Sample
241128-v42a3sznbq
-
MD5
87e8cee1528f5a51d56dbd18bd230e26
-
SHA1
078ae3ff026b1a8667d52898cc49dd9bc59bbc1a
-
SHA256
5b616aefb49ab0dd5f42ec5e967471f7e4985d97adcb83c95519d64701d6e64e
-
SHA512
243b9b681de43f37297036e98e8434081b5e5f9860133580c359b29e83cb949011869cb6c0ab207d10f302afbbc2124a682933bfcc47c6097f8a519dac564168
-
SSDEEP
384:diLxvjF95wrUj9mfucZmN4dKJneWY+AR29H2aHUQc97l60tp4JVcx:IFb6aUfuNN4dyoZk2aHXc9RpcE
Static task
static1
Behavioral task
behavioral1
Sample
ŽIADOSŤ O ROZPOČET 28.11.2024·pdf.vbs
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ŽIADOSŤ O ROZPOČET 28.11.2024·pdf.vbs
Resource
win10v2004-20241007-en
Malware Config
Extracted
remcos
RemoteHost
45hq459.duckdns.org:23458
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-ZP0CQ6
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
ŽIADOSŤ O ROZPOČET 28.11.2024·pdf.vbs
-
Size
33KB
-
MD5
25a7df33e8fee89dfef3426080405533
-
SHA1
3bb1b11f8b041a59a4e8c498c88bbeae17d5f182
-
SHA256
9fc46e1dec1ebaa57e09e3a3d12cfc8b95653d6f26a754a0596d10b0ba9b3f1f
-
SHA512
71fc9d9b64dce6f66941e63567c5eb89f57fb1e9caefbdb9fcd2eb1bb2bde1a98a4b156196b91f47834561a3178bb22665b513edb6b440bf313a39ae63f87b50
-
SSDEEP
768:AxuasGxaSoM5LC3gWamt6iNi+ehBhZ+2JZ/q367gTeVVh0krL3uS:SuasQo2GZU+ehB/+WIQEmf0k3J
-
Remcos family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Blocklisted process makes network request
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook accounts
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Authentication Process
1Modify Registry
2