General
-
Target
https://github.com/cybertoxin/Remcos-Professional-Cracked-By-Alcatraz3222/raw/refs/heads/master/Remcos%20Professional%20Cracked%20By%20Alcatraz3222.zip
-
Sample
250305-b6r1msvvdw
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/cybertoxin/Remcos-Professional-Cracked-By-Alcatraz3222/raw/refs/heads/master/Remcos%20Professional%20Cracked%20By%20Alcatraz3222.zip
Resource
win10v2004-20250217-en
Malware Config
Extracted
njrat
0.7d
HacKed
dllsys.duckdns.org:3202
3b570ffeeb3d34249b9a5ce0ee58a328
-
reg_key
3b570ffeeb3d34249b9a5ce0ee58a328
-
splitter
svchost
Targets
-
-
Target
https://github.com/cybertoxin/Remcos-Professional-Cracked-By-Alcatraz3222/raw/refs/heads/master/Remcos%20Professional%20Cracked%20By%20Alcatraz3222.zip
-
Njrat family
-
Remcos family
-
Modifies Windows Firewall
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1