General

  • Target

    sostener.vbs

  • Size

    2.2MB

  • Sample

    250217-e7qezs1jdm

  • MD5

    60839811d24e7372196d54c2b210c653

  • SHA1

    f18bc8180225752cc50073a277423eab5ba0969e

  • SHA256

    109db0dac55368b1558ade61116654e1b32b971df09afd17b98c24b8153feb7c

  • SHA512

    747a057713c01f34bdaff2b872391e4198466d39ecb6ce9cec961091551a329a1a7347a0a6cd463e3a3a7362e85a4cc8079357937f0f7057d740300254b9d233

  • SSDEEP

    192:rzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzMzzzzzzzzzzzzzzzzzzzzzzzzw:tQqy8c4i6gaAc

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://91.202.233.169/Tak/Reg/Marz/DRG/RTC/AD/dll.txt

exe.dropper

http://91.202.233.169/Tak/Reg/Marz/DRG/RTC/AD/dll.txt

Extracted

Family

remcos

Botnet

NEWD

C2

alemania2020.duckdns.org:8888

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    registros.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-QIOMAY

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Capturas de pantalla

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      sostener.vbs

    • Size

      2.2MB

    • MD5

      60839811d24e7372196d54c2b210c653

    • SHA1

      f18bc8180225752cc50073a277423eab5ba0969e

    • SHA256

      109db0dac55368b1558ade61116654e1b32b971df09afd17b98c24b8153feb7c

    • SHA512

      747a057713c01f34bdaff2b872391e4198466d39ecb6ce9cec961091551a329a1a7347a0a6cd463e3a3a7362e85a4cc8079357937f0f7057d740300254b9d233

    • SSDEEP

      192:rzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzMzzzzzzzzzzzzzzzzzzzzzzzzw:tQqy8c4i6gaAc

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks