General
-
Target
ADNOC_ RFQ Nº 100400806-02.exe
-
Size
1.1MB
-
Sample
210422-jjgwtpa8ae
-
MD5
1f5b694c435df053ef0704fd7eb0c94a
-
SHA1
442d0d0f9ccdbc5ed44cbaad5bd89e40a3112934
-
SHA256
7788ed54eaa344eea1db37d5efaed03d0c8b1d811c8ad6361a448eb5d88cdbaf
-
SHA512
bf48216dae6c8f5fc750c7bb11e593ef38ba8476724dfc1383d1084b2b5906901fd5ece387dec6da91fa7d2274a37e840fb1732998621f1ead345bbddab6c176
Static task
static1
Behavioral task
behavioral1
Sample
ADNOC_ RFQ Nº 100400806-02.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
ADNOC_ RFQ Nº 100400806-02.exe
Resource
win10v20210410
Malware Config
Extracted
remcos
abino.hopto.org:2404
Targets
-
-
Target
ADNOC_ RFQ Nº 100400806-02.exe
-
Size
1.1MB
-
MD5
1f5b694c435df053ef0704fd7eb0c94a
-
SHA1
442d0d0f9ccdbc5ed44cbaad5bd89e40a3112934
-
SHA256
7788ed54eaa344eea1db37d5efaed03d0c8b1d811c8ad6361a448eb5d88cdbaf
-
SHA512
bf48216dae6c8f5fc750c7bb11e593ef38ba8476724dfc1383d1084b2b5906901fd5ece387dec6da91fa7d2274a37e840fb1732998621f1ead345bbddab6c176
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-