General
-
Target
https://github.com/cybertoxin/Remcos-Professional-Cracked-By-Alcatraz3222
-
Sample
250127-wjzr7aznex
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/cybertoxin/Remcos-Professional-Cracked-By-Alcatraz3222
Resource
win10ltsc2021-20250113-en
Malware Config
Extracted
njrat
0.7d
HacKed
dllsys.duckdns.org:3202
3b570ffeeb3d34249b9a5ce0ee58a328
-
reg_key
3b570ffeeb3d34249b9a5ce0ee58a328
-
splitter
svchost
Targets
-
-
Target
https://github.com/cybertoxin/Remcos-Professional-Cracked-By-Alcatraz3222
-
Lucastealer family
-
Njrat family
-
Contacts a large (552) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Executes dropped EXE
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1