General
-
Target
EASTERS.exe
-
Size
128KB
-
Sample
210408-w74x12je6j
-
MD5
4c884f97e78f79fc6d179fde087de2d3
-
SHA1
1fac33ee2e51cc0d358a53b1633536ca457bb86e
-
SHA256
4191897f0eb05e71e982d4ab0289ddce7e769a09e125d09e05b170824a3efbc6
-
SHA512
a3029d94f76ee2c435a01d23b52ad48beb4b9d6fa69ec013c13a6622f74d4a9de60d83b6e0c0110c1ad88cacafd3beaa3ce8f4e85ad893774765e39b56432b91
Static task
static1
Behavioral task
behavioral1
Sample
EASTERS.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
EASTERS.exe
Resource
win10v20201028
Malware Config
Extracted
remcos
osisego.ddns.net:2405
Targets
-
-
Target
EASTERS.exe
-
Size
128KB
-
MD5
4c884f97e78f79fc6d179fde087de2d3
-
SHA1
1fac33ee2e51cc0d358a53b1633536ca457bb86e
-
SHA256
4191897f0eb05e71e982d4ab0289ddce7e769a09e125d09e05b170824a3efbc6
-
SHA512
a3029d94f76ee2c435a01d23b52ad48beb4b9d6fa69ec013c13a6622f74d4a9de60d83b6e0c0110c1ad88cacafd3beaa3ce8f4e85ad893774765e39b56432b91
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-