General
-
Target
HKL.vbs
-
Size
736KB
-
Sample
230601-v4z31sfh7v
-
MD5
d21fa8f92d5215bf0dcaa7b777d76ee9
-
SHA1
84bf4b5ca3029cc3c9ffede2ec99cad516a6a5cd
-
SHA256
e224c2c5cc744249849a02dc80b8f3b54e68b867df6919675d32195c71fd2e23
-
SHA512
02c258bf85a365683cc9f51fb0dfa1937ef406d3dc7baf294dd7ca1fe9d05008e0514eb34def72baf37df87738ae29123702626430393460c782e02efa5b755d
-
SSDEEP
3072:HPG6wfkYFEhNe4VTdRnTT8w4TWkuIFd7c7nBy+KV9jCZqskg/rpd+og0S7wQzS1y:twfkYF0gh9eZqX
Static task
static1
Behavioral task
behavioral1
Sample
HKL.vbs
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
HKL.vbs
Resource
win10v2004-20230220-en
Malware Config
Extracted
remcos
Awelle-Host
gdyhjjdhbvxgsfe.gotdns.ch:2718
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Rmc-W62KZF
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
HKL.vbs
-
Size
736KB
-
MD5
d21fa8f92d5215bf0dcaa7b777d76ee9
-
SHA1
84bf4b5ca3029cc3c9ffede2ec99cad516a6a5cd
-
SHA256
e224c2c5cc744249849a02dc80b8f3b54e68b867df6919675d32195c71fd2e23
-
SHA512
02c258bf85a365683cc9f51fb0dfa1937ef406d3dc7baf294dd7ca1fe9d05008e0514eb34def72baf37df87738ae29123702626430393460c782e02efa5b755d
-
SSDEEP
3072:HPG6wfkYFEhNe4VTdRnTT8w4TWkuIFd7c7nBy+KV9jCZqskg/rpd+og0S7wQzS1y:twfkYF0gh9eZqX
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-