General
-
Target
29112024_0124_A1_racun_11-2024�pdf.vbs.zip
-
Size
19KB
-
Sample
241129-bskz6sxphs
-
MD5
bd727fb1a8818b23ad409f52143fae28
-
SHA1
2599145540391a2c6cfaa3b326c517ed49abc4be
-
SHA256
473e499898c19aaffee3f27962c2395b36ade8e750f58f20d09c1e9e5bf2bfc2
-
SHA512
b6b213518ab60cc7b626d320d24fd77c06b52989f4dcc62d989752f0fccc533b7122d8b537aa2e846ea4c5200ab8d14c654e5201ac95cd67d5f0bf54e80f9b96
-
SSDEEP
384:78jbSGXTAMVqxrfUBCeeCd7OjaI+j+nEw8gg8P4pnH+Y:78/SuANxrfUBCuaJZN8XGSnh
Static task
static1
Behavioral task
behavioral1
Sample
A1_racun_11-2024·pdf.vbs
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
A1_racun_11-2024·pdf.vbs
Resource
win10v2004-20241007-en
Malware Config
Extracted
remcos
RemoteHost
8766e34g8.duckdns.org:3782
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-93TSMD
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
A1_racun_11-2024·pdf.vbs
-
Size
33KB
-
MD5
f504f2da583147ba689b230b21f1e8d3
-
SHA1
50db98c2c533c4b8d253e05341ce99245e6c9af2
-
SHA256
9f76359976c222dd3a0f75b05b171711f88f60105f2a285dacd3cd122fb56794
-
SHA512
8b2d7844ea1400316c79d0055039e977eed7336fe7f387c8c2931d8437cebbae3af75431d16c93eeffcdd45ffe1cdc8b3578afe8da008f386dd26eb106545b13
-
SSDEEP
768:VxCasOdkFIouoA9wVI5XULTNTNk3hEC9cjhZrE0XYfONFZqMVVasDwrqqX:HCasfILrxaOI/J8sDw2Q
-
Remcos family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Blocklisted process makes network request
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Modify Authentication Process
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Authentication Process
1Modify Registry
3