General

  • Target

    tmp

  • Size

    1.3MB

  • Sample

    230322-r2atkahd29

  • MD5

    d8e622d9974ee940831e507fac715c94

  • SHA1

    7f6b6850c5146c6942148eae317387e5c85342ea

  • SHA256

    7988fe75eb1abeac99917732c69e0de5e96137b5a8f471b4c8af2ef378505312

  • SHA512

    6c5bd4dd4bfbb4c75bf392141446496473cf035ebfe6b70bdfe0278ec67ffbffdc4b9ba937ca80d5ef7ed80fa8ce6ca3ebd4e02821f155580377b503ed17a3d6

  • SSDEEP

    24576:V5F02vDR3+R4znIM4PkgW6REfPSt6BPoUi17+9QloSN3TEt8dni:fF/9RnIIgWBg+AUi1S9QCSNDEin

Malware Config

Extracted

Family

remcos

Botnet

Awele-Host

C2

gdyhjjdhbvxgsfe.gotdns.ch:2718

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    qos.exe

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    true

  • install_flag

    true

  • install_path

    %AppData%

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    Rmc-VC3F2C

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Jm

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      tmp

    • Size

      1.3MB

    • MD5

      d8e622d9974ee940831e507fac715c94

    • SHA1

      7f6b6850c5146c6942148eae317387e5c85342ea

    • SHA256

      7988fe75eb1abeac99917732c69e0de5e96137b5a8f471b4c8af2ef378505312

    • SHA512

      6c5bd4dd4bfbb4c75bf392141446496473cf035ebfe6b70bdfe0278ec67ffbffdc4b9ba937ca80d5ef7ed80fa8ce6ca3ebd4e02821f155580377b503ed17a3d6

    • SSDEEP

      24576:V5F02vDR3+R4znIM4PkgW6REfPSt6BPoUi17+9QloSN3TEt8dni:fF/9RnIIgWBg+AUi1S9QCSNDEin

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks