Cotx RAT

Description

(Proofpoint) The RasTls.dll contains the Cotx RAT code. The malware is written in C++ using object-oriented programming. We named it by borrowing the name of the location of its stored configuration. The encrypted configuration is stored in the side-loaded DLL file RasTls.dll in a PE section named “.cotx”. The current encrypted configuration is also stored in the registry key “HKEY_LOCAL_MACHINE\SOFTWARE\Intel\Java\user”.

The command and control structure of Cotx RAT is proxy aware. It utilizes wolfSSL for TLS encrypted communication. The initial beacon contains “|”-delimited system information. The data included in the beacon is Zlib compressed and encrypted with AES-192 in CBC mode utilizing the same keys as the configuration. The following values are included:

• ‘id’ value from ‘software\intel\java’ subkey • Computer name • ‘mark’ field from configuration • Username • Windows version • Architecture • Possible malware version. ‘0.9.7’ is hardcoded in the analyzed sample • Local IP addresses • First adapter’s MAC address • Connection type (https or _proxy) • ‘password’ field from configuration

Names

Name
Cotx RAT

Category

Malware

Type

  • Reconnaissance
  • Backdoor
  • Credential stealer

Information

Malpedia

Other Information

Uuid

071fed27-3361-4b37-a553-8e32c65482c8

Last Card Change

2021-04-24