General

  • Target

    Sublabially.vbs

  • Size

    46KB

  • Sample

    241217-h7tzysvmdj

  • MD5

    c4189a98b8eda94cb6632e57fe824155

  • SHA1

    0455b4277f9ad2e1ed9d6349c9459a843ddf5dff

  • SHA256

    9ab13f3f467c2ee1421b70d642789f7ee63bdf94841bd612e5ffa44c041a9a45

  • SHA512

    510ee5434ce30929c435fbfbc113d7d6549a08961ffe3e52f0dd354cc5f76fd38bf741260b5fef15582f892cad891da56fe9db114a71a326bd5f665faa298d55

  • SSDEEP

    768:DUjonk+CRK4ItAdI5ll04OLUjK+64dfChihLRJI8Z9z2Ano9uKFgS:Deok/VdI5l6RLUiCDLqA7AJ

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

154.216.18.216:2404

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-7K8JAD

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      Sublabially.vbs

    • Size

      46KB

    • MD5

      c4189a98b8eda94cb6632e57fe824155

    • SHA1

      0455b4277f9ad2e1ed9d6349c9459a843ddf5dff

    • SHA256

      9ab13f3f467c2ee1421b70d642789f7ee63bdf94841bd612e5ffa44c041a9a45

    • SHA512

      510ee5434ce30929c435fbfbc113d7d6549a08961ffe3e52f0dd354cc5f76fd38bf741260b5fef15582f892cad891da56fe9db114a71a326bd5f665faa298d55

    • SSDEEP

      768:DUjonk+CRK4ItAdI5ll04OLUjK+64dfChihLRJI8Z9z2Ano9uKFgS:Deok/VdI5l6RLUiCDLqA7AJ

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks