General
-
Target
purchase order for july.exe
-
Size
531KB
-
Sample
200709-frvs7exrtx
-
MD5
2b8ffa3d1e175136dbecbc64b2562294
-
SHA1
1f9f9a709fc9565ffea8b3f3a655a607aff03d28
-
SHA256
74c74bc92e1e2b1fbec04160533ddc46adfd8e2f691295ad4a08cbd83e01adc7
-
SHA512
be86d9ffca14908d42a7782664eb6eabc669c2b25ec6dd3ad332b934c860a7513773e6e85de1e084d3965ac839959b546a77dbf81e3526dc698e94386bc74802
Static task
static1
Behavioral task
behavioral1
Sample
purchase order for july.exe
Resource
win7
Behavioral task
behavioral2
Sample
purchase order for july.exe
Resource
win10v200430
Malware Config
Extracted
remcos
194.5.97.18:6642
gozman11.duckdns.org:6642
Targets
-
-
Target
purchase order for july.exe
-
Size
531KB
-
MD5
2b8ffa3d1e175136dbecbc64b2562294
-
SHA1
1f9f9a709fc9565ffea8b3f3a655a607aff03d28
-
SHA256
74c74bc92e1e2b1fbec04160533ddc46adfd8e2f691295ad4a08cbd83e01adc7
-
SHA512
be86d9ffca14908d42a7782664eb6eabc669c2b25ec6dd3ad332b934c860a7513773e6e85de1e084d3965ac839959b546a77dbf81e3526dc698e94386bc74802
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run entry to start application
-
Suspicious use of SetThreadContext
-