General
-
Target
New_Payment_Advice-04-08-2021.zip
-
Size
592KB
-
Sample
210419-mtkj679ann
-
MD5
724f4f1e13c90ab13597019446ad5d94
-
SHA1
709b5ff4f67fa9e1a103998f82b7f70a5f8a9a41
-
SHA256
38083f328ed0cc2811ae4de57a23e659461b545efbaaad13e5a2abb7e3bccc27
-
SHA512
832f766e126e67ee6779f377e3cd5b5b68f2fbb471def4a9241ace9f3e6c258b45ebe6051dc75ba865fc146fe0216e68f1aef5cb454550376766dc162fea9bb5
Static task
static1
Behavioral task
behavioral1
Sample
New_Payment_Advice-04-08-2021.exe
Resource
win7v20210408
Malware Config
Extracted
remcos
79.134.225.78:2404
Targets
-
-
Target
New_Payment_Advice-04-08-2021.exe
-
Size
1.1MB
-
MD5
b406cc9e628e1622fdeb6c19bc119869
-
SHA1
8154bf8ee1d7c43ce0743dee7c5d102e91dbea78
-
SHA256
a16800dbbc35690f64fb554acd3bbd0d9e4f54e8404a99dac0aacc9e41916f20
-
SHA512
d3354be9347ce446e1a4b108d309429862c48b49f99e2248c29f8224b2c7650cd70167e46560d0b96b1898a60780381f5686e1e28b060be66091a8d7a758eb75
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-