General

  • Target

    Factura de IVA,pdf.cab

  • Size

    21KB

  • Sample

    241219-thx6vsvnas

  • MD5

    024425f45df524e445942269aa273d95

  • SHA1

    f3323712c240952ad20d8f384aa3f330085b8a89

  • SHA256

    10f4d98c14cd8b1b6815baabe19053b2dd475fe31ba96463e33c4128992397da

  • SHA512

    55386ca5ff2ed471437eef297a8fd549925132a48b5bf9f52f0725eb6ff3f15573b657805c14a9e870554f3046a84a6ca68379768547a83829a95582c996ca71

  • SSDEEP

    384:jlQJwjI6XYWAfT3MINTPA4Pt6QBhDq4ycEPj3YNlc4QOQHs5vcoQ2:jlnXYVcx4Pt9hq5rjnQQ2

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

https://res.cloudinary.com/dzvai86uh/image/upload/v1734315244/m3gtbqktvnocyvm410aa.jpg

exe.dropper

https://res.cloudinary.com/dzvai86uh/image/upload/v1734315244/m3gtbqktvnocyvm410aa.jpg

Extracted

Family

remcos

Botnet

NEW

C2

rem.pushswroller.eu:23101

firewarzone.ydns.eu:23101

dim.remofficialws.top:23101

rem.officialswvrem.top:23101

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmcghdzxtrswtwg-BJ2KPV

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      Factura de IVA,pdf.vbs

    • Size

      152KB

    • MD5

      4dd53bc42716f9abe36ae85c8ca8ea4b

    • SHA1

      aa44fc15455a5283e6596a4da7ee87ac4e4b8901

    • SHA256

      d2256247fae569fdaf99ce1a41dc036c5e4ca7b637a52314f51b726e39096573

    • SHA512

      d9f5410d0f7c9135fa2b388030c766969ed7ea70edae73b514820bb39251f4f66d9af3d39fc46327cb7a6f207ca3e3b7e86a8fecec7629a3606d3c0789777952

    • SSDEEP

      3072:A8gVmI3b0mgfmWu+Dwe9VOv5iG5sVhQ30Wk+70wgA1A:A8gVde9VOvM

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks