General
-
Target
DOCUMENT#5885588@081366(766.pdf.exe
-
Size
512KB
-
Sample
241211-k7a8yswmgx
-
MD5
053184cbad166da8d6065e1fb934b964
-
SHA1
54fa68f4233ab168238ea71af23eec2436552a0b
-
SHA256
c877c021f20392b5c63533b4e59522f17d060d20341a47c76f24b7430c72ad54
-
SHA512
b6402e9b634cee834db92edfe02f39a77fecfef3ff2836605c2f1276424287e5559a34306a4d376ea999fe0850c27c45d3d16ce00a91d9a65f27ba04c3d6ea69
-
SSDEEP
12288:1BRxKL/cM4jJL3O80+E3DzGpiOZWWiawo9fv6MIfGYfmBBWMM:JwLkPjJLO6pilWva/fPmo
Static task
static1
Behavioral task
behavioral1
Sample
DOCUMENT#5885588@081366(766.pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
DOCUMENT#5885588@081366(766.pdf.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Tredjelandes.ps1
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Tredjelandes.ps1
Resource
win10v2004-20241007-en
Malware Config
Extracted
remcos
WOW
eweo9264gtuiorta1.duckdns.org:2879
eweo9264gtuiorta1.duckdns.org:2889
surit2948estoat02.duckdns.org:2879
lafours8tursot2.duckdns.org:2879
lafours8tursot3.duckdns.org:2879
lafours8tursot4.duckdns.org:2879
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
hajoest.dat
-
keylog_flag
false
-
mouse_option
false
-
mutex
fsgthdjtru-5Y7T6I
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
DOCUMENT#5885588@081366(766.pdf.exe
-
Size
512KB
-
MD5
053184cbad166da8d6065e1fb934b964
-
SHA1
54fa68f4233ab168238ea71af23eec2436552a0b
-
SHA256
c877c021f20392b5c63533b4e59522f17d060d20341a47c76f24b7430c72ad54
-
SHA512
b6402e9b634cee834db92edfe02f39a77fecfef3ff2836605c2f1276424287e5559a34306a4d376ea999fe0850c27c45d3d16ce00a91d9a65f27ba04c3d6ea69
-
SSDEEP
12288:1BRxKL/cM4jJL3O80+E3DzGpiOZWWiawo9fv6MIfGYfmBBWMM:JwLkPjJLO6pilWva/fPmo
-
Remcos family
-
Adds Run key to start application
-
Blocklisted process makes network request
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
Tredjelandes.Sel
-
Size
52KB
-
MD5
85edb7354ba656bbb556d21c8e68831c
-
SHA1
e01c029026be5e5d7e17cdd191360d9bbd9d9e27
-
SHA256
d9b3298dafafc8f85e167c0c739d94cf6671f017e1a0cf7e759ff6158b5921ed
-
SHA512
b86b8ee9f4f0f0421074de62c439ef5cf63b441f44b95c9a1ca28b357c9fd52c85ba00af70e975f4e5aa4601829026ee2ebec143fb9357815e76635fdf3a28d5
-
SSDEEP
1536:qOoV6LfQgMGl7Fdwq3BcfTjOYysx3jXpsOWL9z:td5MCFaqxcfTj7vX/kz
Score8/10-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1