General

  • Target

    PO 543-35017173 - 07.58.14.509.exe

  • Size

    980KB

  • Sample

    230525-p6e8qsag6t

  • MD5

    8a4b25fad86c1369e690eb37b68300d0

  • SHA1

    6c547762edae1d2e6cbb856a987b5fdf8604da6a

  • SHA256

    88c915fc9b19666779df6aa7bf4be92a7bc293ba9a00269ae1e83f2605a54f50

  • SHA512

    550c7e060f8564d33751a411444001e3a97ef7945881d83b8fe455bbc7768e3d1ad36db6ea5a7a43cd34103b82ed191513c3fbb5e2388ad0b43e73fd9c3d6e30

  • SSDEEP

    24576:F9BEP88Xlp3mYUwfiEF3cBMPR8jJOg7B9:DBe8mlp9Uwqa3cBumpB9

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

Awelle-Host

C2

gdyhjjdhbvxgsfe.gotdns.ch:2718

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    Rmc-W62KZF

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      PO 543-35017173 - 07.58.14.509.exe

    • Size

      980KB

    • MD5

      8a4b25fad86c1369e690eb37b68300d0

    • SHA1

      6c547762edae1d2e6cbb856a987b5fdf8604da6a

    • SHA256

      88c915fc9b19666779df6aa7bf4be92a7bc293ba9a00269ae1e83f2605a54f50

    • SHA512

      550c7e060f8564d33751a411444001e3a97ef7945881d83b8fe455bbc7768e3d1ad36db6ea5a7a43cd34103b82ed191513c3fbb5e2388ad0b43e73fd9c3d6e30

    • SSDEEP

      24576:F9BEP88Xlp3mYUwfiEF3cBMPR8jJOg7B9:DBe8mlp9Uwqa3cBumpB9

    Score
    10/10
    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks