Advertisement
VRad

#remcos_160824

Aug 17th, 2024 (edited)
332
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.15 KB | None | 0 0
  1. #IOC #OptiData #VR #remcos #RAT #AutoIt #PWD
  2.  
  3. https://pastebin.com/AkHsxz6R
  4.  
  5. previous_contact:
  6. 13/08/24 https://pastebin.com/VDVp6hSi
  7. 19/01/24 https://pastebin.com/EvXHfZUB
  8. 18/01/24 https://pastebin.com/FL2fX362
  9. 25/12/23 https://pastebin.com/D535PVm3
  10. 21/12/23 https://pastebin.com/samYnJq6
  11. 30/11/23 https://pastebin.com/aG6XyqHN
  12. 13/11/23 https://pastebin.com/tbRpiGG5
  13. 06/02/23 https://pastebin.com/kjv5E8Au
  14.  
  15. FAQ:
  16. https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
  17.  
  18. attack_vector
  19. --------------
  20. email attach or bitbucket .org /privatbank /obmen /downloads > .7z > .rar (multi) > .rar (pwd) > .exe > .cmd > .pif > C2
  21.  
  22. # # # # # # # #
  23. email_headers
  24. # # # # # # # #
  25. Date: Fri, 16 Aug 2024 13:08:42 +0300
  26. From: Беляев Вольдемар Альвианович <finmons@ privatbank _ua>
  27. Subject: Запит інформації № 0638543 вiд: 16.08.2024
  28. Reply-To: "public@ cip _gov _ua" <public@ cip _gov _ua>
  29. Received: from linux -hosting66 _rdsweb _ro ([84 _232 _181 _66])
  30. Received: from [193 _33 _153 _89] (port=59597 helo=193 _33 _153 _89)
  31.  
  32. # # # # # # # #
  33. files
  34. # # # # # # # #
  35. SHA-256 c71463ac4fb8dd985b249b61e54888137bea84dab7c202546e230eb450fc0969
  36. File name Електронні акт №094584 Приватбанк24.exe
  37. File size 1.53 MB (1602827 bytes)
  38.  
  39. SHA-256 237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
  40. File name Aids.pif
  41. File size 872.66 KB (893608 bytes)
  42.  
  43. # # # # # # # #
  44. activity
  45. # # # # # # # #
  46.  
  47. PL_SCR email attach or bitbucket .org /privatbank /obmen /downloads
  48.  
  49.  
  50. C2 111 _90 _147 _110
  51.  
  52. netwrk
  53. --------------
  54. 111 _90 _147 _110 81 TLSv1.3 Client Hello
  55. 178 _237 _33 _50 geoplugin _net 80 HTTP GET /json.gp HTTP/1.1
  56.  
  57. comp
  58. --------------
  59. Aids.pif 111 _90 _147 _110 443
  60.  
  61. proc
  62. --------------
  63. C:\Users\User01\Downloads\files1608\4_Електронні акт №094584 Приватбанк24.exe
  64. "C:\Windows\System32\cmd.exe" /k move Nearest Nearest.cmd & Nearest.cmd & exit
  65. C:\Windows\SysWOW64\tasklist.exe
  66. C:\Windows\SysWOW64\findstr.exe /I "wrsa.exe opssvc.exe"
  67. C:\Windows\SysWOW64\tasklist.exe
  68. C:\Windows\SysWOW64\findstr.exe /I "avastui.exe avgui.exe bdservicehost.exe ekrn.exe nswscsvc.exe sophoshealth.exe"
  69. C:\Windows\SysWOW64\cmd.exe /c md 559861
  70. C:\Windows\SysWOW64\findstr.exe /V "highwaysoptimalrebeccascope" Reliable
  71. C:\Windows\SysWOW64\cmd.exe /c copy /b ..\Shadow + ..\Finnish + ..\Ambien + ..\Reached + ..\Dana + ..\Worth + ..\Access + ..\Vocals + ..\Clocks + ..\Aluminium + ..\Tries + ..\Calm + ..\Unlike s
  72. C:\Users\User01\AppData\Local\Temp\559861\Aids.pif
  73. C:\Users\User01\AppData\Local\Temp\559861\Aids.pif /stext "C:\Users\User01\AppData\Local\Temp\vbfesgbxk"
  74. C:\Users\User01\AppData\Local\Temp\559861\Aids.pif /stext "C:\Users\User01\AppData\Local\Temp\fdkotymqynfly"
  75. C:\Users\User01\AppData\Local\Temp\559861\Aids.pif /stext "C:\Users\User01\AppData\Local\Temp\ixphurxsuvxqifwq"
  76. C:\Windows\SysWOW64\choice.exe /d y /t 5
  77.  
  78. persist
  79. --------------
  80. C:\Users\User01\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EcoGiraffe.url Sat Aug 17 14:59:25 2024
  81.  
  82. drop
  83. --------------
  84. C:\Users\User01\AppData\Local\Temp\Calm
  85. C:\Users\User01\AppData\Local\Temp\Clocks
  86. C:\Users\User01\AppData\Local\Temp\Dana
  87. C:\Users\User01\AppData\Local\Temp\Finnish
  88. C:\Users\User01\AppData\Local\Temp\Fix
  89. C:\Users\User01\AppData\Local\Temp\Nearest.cmd
  90. C:\Users\User01\AppData\Local\Temp\Reached
  91. C:\Users\User01\AppData\Local\Temp\Reliable
  92. C:\Users\User01\AppData\Local\Temp\Shadow
  93. C:\Users\User01\AppData\Local\Temp\Tries
  94. C:\Users\User01\AppData\Local\Temp\Unlike
  95. C:\Users\User01\AppData\Local\Temp\Vocals
  96. C:\Users\User01\AppData\Local\Temp\Worth
  97. C:\Users\User01\AppData\Local\Temp\559861\Aids.pif
  98.  
  99. # # # # # # # #
  100. additional info
  101. # # # # # # # #
  102. n/a
  103.  
  104. # # # # # # # #
  105. VT & Intezer
  106. # # # # # # # #
  107. https://www.virustotal.com/gui/file/c71463ac4fb8dd985b249b61e54888137bea84dab7c202546e230eb450fc0969/details
  108. https://www.virustotal.com/gui/file/237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d/details
  109.  
  110. VR
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement