General

  • Target

    86e8bfaeaff4ba2706de162b159d6052

  • Size

    1.1MB

  • Sample

    221125-d2g1zscc91

  • MD5

    86e8bfaeaff4ba2706de162b159d6052

  • SHA1

    28b240580810cf142440558c073118f5a7cb6cc1

  • SHA256

    2d3030fd5b7664be15fc730d2e6ecaf0a0df5a28ee2aad28cd6b989b64c8e262

  • SHA512

    40e3a05a63efb06bb8628f03be726ff18055bf9cfe44b35f6c95bd69816c11c0ace421dbbc3ccf57159edc78ae9f7173391815fde7b20d333a53162076e3f2e3

  • SSDEEP

    24576:YAFBkPPpLnSrpcMiU7e0zJO4w1Uk3PeLAwhrbhP:vFyhnypZtJ5w1XYhhf

Malware Config

Extracted

Family

remcos

Botnet

Awele

C2

gdyhjjdhbvxgsfe.gotdns.ch:2718

Attributes
  • audio_folder

    MicRecords

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    qoc.exe

  • delete_file

    false

  • hide_file

    true

  • hide_keylog_file

    true

  • install_flag

    true

  • install_path

    %AppData%

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    Remcos-LLTFOH

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    mix

  • take_screenshot_option

    false

  • take_screenshot_time

    5

  • take_screenshot_title

    notepad;solitaire;

Targets

    • Target

      86e8bfaeaff4ba2706de162b159d6052

    • Size

      1.1MB

    • MD5

      86e8bfaeaff4ba2706de162b159d6052

    • SHA1

      28b240580810cf142440558c073118f5a7cb6cc1

    • SHA256

      2d3030fd5b7664be15fc730d2e6ecaf0a0df5a28ee2aad28cd6b989b64c8e262

    • SHA512

      40e3a05a63efb06bb8628f03be726ff18055bf9cfe44b35f6c95bd69816c11c0ace421dbbc3ccf57159edc78ae9f7173391815fde7b20d333a53162076e3f2e3

    • SSDEEP

      24576:YAFBkPPpLnSrpcMiU7e0zJO4w1Uk3PeLAwhrbhP:vFyhnypZtJ5w1XYhhf

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks