General

  • Target

    GHJ.exe

  • Size

    427KB

  • Sample

    230608-hrkrcada75

  • MD5

    8f62a1c24abe9caaed3a96b080f33ed6

  • SHA1

    c2bfe47753df633fe764e78ad36d755a0d9f3405

  • SHA256

    869f790d57a50f69dea8c50c016d6c2301ac8618e1abd684af127f14a6a35661

  • SHA512

    48d63f9e6d2fcab569dcd8599940dd0d51c8792985cd40bb8397aee195a431638922fe7c3614319255330a72c909e005641f714cf535e12e69564052b602afa1

  • SSDEEP

    12288:50+FrXbGM2i28hs/mfPRtfXYd46sMD5ibuWNa:50YraPL/mfP/XY/Rdi1a

Malware Config

Extracted

Family

remcos

Botnet

Awelle-Host

C2

gdyhjjdhbvxgsfe.gotdns.ch:2718

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    Rmc-W62KZF

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      GHJ.exe

    • Size

      427KB

    • MD5

      8f62a1c24abe9caaed3a96b080f33ed6

    • SHA1

      c2bfe47753df633fe764e78ad36d755a0d9f3405

    • SHA256

      869f790d57a50f69dea8c50c016d6c2301ac8618e1abd684af127f14a6a35661

    • SHA512

      48d63f9e6d2fcab569dcd8599940dd0d51c8792985cd40bb8397aee195a431638922fe7c3614319255330a72c909e005641f714cf535e12e69564052b602afa1

    • SSDEEP

      12288:50+FrXbGM2i28hs/mfPRtfXYd46sMD5ibuWNa:50YraPL/mfP/XY/Rdi1a

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Checks QEMU agent file

      Checks presence of QEMU agent, possibly to detect virtualization.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks