Threat name:
Remcos, AsyncRAT, Dacic, DcRat, PureLog
Alert
Classification:
rans.troj.spyw.expl.evad
.NET source code references suspicious native API functions
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Contains functionality to bypass UAC (CMSTPLUA)
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Creates processes via WMI
Found malware configuration
Injects a PE file into a foreign processes
JavaScript source code contains functionality to generate code involving a shell, file or stream
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Sample uses string decryption to hide its real strings
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: PowerShell Base64 Encoded Invoke Keyword
Sigma detected: Register Wscript In Run Key
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Silenttrinity Stager Msbuild Activity
Sigma detected: Suspicious PowerShell Parameter Substring
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WScript or CScript Dropper
Sigma detected: WScript or CScript Dropper - File
Suricata IDS alerts for network traffic
Suspicious execution chain found
Suspicious powershell command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Windows Shell Script Host drops VBS files
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected Powershell decode and execute
Yara detected Powershell download and execute
Yara detected PureLog Stealer
Yara detected UAC Bypass using CMSTP
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1758629
Sample:
IMG_36313.js
Startdate:
17/08/2025
Architecture:
WINDOWS
Score:
100
84
kalelsianoass.dynuddns.net
2->84
86
base64txtdownload.xyz
2->86
88
4 other IPs or domains
2->88
116
Sigma detected: Register
Wscript In Run Key
2->116
118
Suricata IDS alerts
for network traffic
2->118
120
Found malware configuration
2->120
126
27 other signatures
2->126
14
wscript.exe
1
2->14
started
17
wscript.exe
2->17
started
19
wscript.exe
2->19
started
21
svchost.exe
1
1
2->21
started
signatures3
122
Uses dynamic DNS services
84->122
124
Performs DNS queries
to domains with low
reputation
86->124
process4
dnsIp5
150
Suspicious powershell
command line found
14->150
152
Wscript starts Powershell
(via cmd or directly)
14->152
154
Bypasses PowerShell
execution policy
14->154
158
2 other signatures
14->158
24
powershell.exe
14
16
14->24
started
156
Windows Scripting host
queries suspicious COM
object (likely to drop
second stage)
17->156
28
powershell.exe
17->28
started
30
powershell.exe
19->30
started
94
127.0.0.1
unknown
unknown
21->94
signatures6
process7
dnsIp8
96
files.catbox.moe
108.181.20.35, 443, 49715
ASN852CA
Canada
24->96
132
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
24->132
134
Writes to foreign memory
regions
24->134
136
Injects a PE file into
a foreign processes
24->136
32
MSBuild.exe
2
4
24->32
started
37
conhost.exe
24->37
started
39
MSBuild.exe
28->39
started
41
conhost.exe
28->41
started
43
MSBuild.exe
28->43
started
45
MSBuild.exe
30->45
started
47
conhost.exe
30->47
started
signatures9
process10
dnsIp11
80
kalelsianoass.dynuddns.net
142.202.191.102, 49723, 49726, 8848
DYNUUS
Reserved
32->80
74
C:\Users\user\AppData\...\Rem-hidden-new.vbs, Unicode
32->74
dropped
106
Contains functionality
to bypass UAC (CMSTPLUA)
32->106
108
Contains functionalty
to change the wallpaper
32->108
110
Contains functionality
to steal Chrome passwords
or cookies
32->110
114
2 other signatures
32->114
49
cmd.exe
1
32->49
started
112
Detected Remcos RAT
39->112
file12
signatures13
process14
signatures15
98
Suspicious powershell
command line found
49->98
100
Wscript starts Powershell
(via cmd or directly)
49->100
52
powershell.exe
3
10
49->52
started
55
conhost.exe
49->55
started
process16
signatures17
128
Contains functionality
to check if a debugger
is running (CheckRemoteDebuggerPresent)
52->128
57
wscript.exe
1
3
52->57
started
process18
file19
76
C:\Users\user\AppData\Local\...\174992150.vbs, ASCII
57->76
dropped
78
C:\Users\user\AppData\Local\...\174992150.ps1, Unicode
57->78
dropped
138
Suspicious powershell
command line found
57->138
140
Wscript starts Powershell
(via cmd or directly)
57->140
142
Windows Shell Script
Host drops VBS files
57->142
144
2 other signatures
57->144
61
wscript.exe
1
57->61
started
signatures20
process21
signatures22
146
Suspicious powershell
command line found
61->146
148
Wscript starts Powershell
(via cmd or directly)
61->148
64
powershell.exe
15
13
61->64
started
process23
dnsIp24
82
base64txtdownload.xyz
198.54.115.2, 443, 49728, 49731
NAMECHEAP-NETUS
United States
64->82
102
Writes to foreign memory
regions
64->102
104
Injects a PE file into
a foreign processes
64->104
68
MSBuild.exe
64->68
started
72
conhost.exe
64->72
started
signatures25
process26
dnsIp27
90
148.113.165.11, 4090, 49729
GOOGLE-PRIVATE-CLOUDUS
United States
68->90
92
geoplugin.net
178.237.33.50, 49730, 80
ATOM86-ASATOM86NL
Netherlands
68->92
130
Detected Remcos RAT
68->130
signatures28
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.