General
-
Target
bafff28ad6d4b843fbd422d34d48470ac5b738c844232b71fb7e503a2f75d92d.7z
-
Size
434KB
-
Sample
250215-evpb6avjcr
-
MD5
9f43a13fabbed8e92b859664f0bc26bb
-
SHA1
cbd4e573b0674c52176deb62e57538803aaaf80d
-
SHA256
bafff28ad6d4b843fbd422d34d48470ac5b738c844232b71fb7e503a2f75d92d
-
SHA512
8979b76e5ed79a503c26f33a548ed91b10eff97c841259300b96d2f82a06685f96901c9c173b8ae24a05f9d1b8f9e71572f8374b4f29cdda80a7839b45d65131
-
SSDEEP
12288:y+KheBGD+gi74U4LaCW69+F77GAunERwOb/:yvMBsFiVCWr7CAunEGi
Static task
static1
Behavioral task
behavioral1
Sample
Teufelberger,pdf.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Teufelberger,pdf.vbs
Resource
win10v2004-20250211-en
Malware Config
Extracted
remcos
Aboki
abokirem.duckdns.org:56379
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-J4I3IV
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
Teufelberger,pdf.vbs
-
Size
565KB
-
MD5
9b98d98f1219f50085218002b9d6d13e
-
SHA1
98f7f59822afb1b87f7d5308f07fcfb54fc3c970
-
SHA256
01ed509842998f2309e2aa5ff2aaba7f12fec0e25c7a7a6f01d5d672c6a06363
-
SHA512
3fff27a5923af1d7834aa193602bd5231b2f0c0e498d5f87ed232602ef9c61c19a5a8cc11ae7df7b0576169d363c00b7ded0bcd5c980198b60bef56d5554027b
-
SSDEEP
12288:pJrrbl3eNvxisBksII3s+ngAHjQVbF7ywmL/KSapUd:Ld3eBweII3e+kxpBpS
-
Remcos family
-
Blocklisted process makes network request
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Browser Extensions
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Component Object Model Hijacking
1