General

  • Target

    02122024_1030_328835_140264_1pdf.vbs.zip

  • Size

    19KB

  • Sample

    241202-mqjj4s1lc1

  • MD5

    c13ad6e347640472a4bf71654fc717f7

  • SHA1

    0ca56204cf937f2497d3432aa1ce4789c13bab6b

  • SHA256

    05f8fb9335954bb1069a2dd6dbbf5ba8c605e3923c3ed0c974f95cd62fd10b67

  • SHA512

    e70d894982975cf00693de212d690a2c6e72a211e94e1920d89c122ed9d80eb9f0e4c7984ce12a4e185e4135e9c17de68e9f5979277e0843101dc7d0a5692ced

  • SSDEEP

    384:Vq/ooKCgGYgsroJh3ccjv17QdCf6rcvlwJKjmUhR1rs8ugDZUp5d50nrzBp:oges073cGcCfY+l8Kh/Fs3gS9mnz

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

8766e34g8.duckdns.org:3782

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-93TSMD

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      328835_140264_1·pdf.vbs

    • Size

      33KB

    • MD5

      a9636ba5124550a3c145fef91fa5489d

    • SHA1

      f3ab90b16fef6a323c1a4eb44aa47acecdac3ca6

    • SHA256

      146882bf4a0d47c6db66dacbc5e283a85097a8320cf653641d380ebeab6c4c10

    • SHA512

      9b004cbdd4d35d7dd7038efd8e002b7022e1e6e9c3207535934f362c8e3a45e23ebe87ec1de5f7c37ff8f6afdbe7fc5deb5baa56957ba365abc8dae8a7fce7fa

    • SSDEEP

      768:+fZasQ6lMFJfJc4PCPPNngWWshZBTYRikWbVVw4OrxBX:eZasOFfXiPeWWs/BYse4OXX

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • UAC bypass

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Blocklisted process makes network request

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks