General
-
Target
Vid_439430_pac_934843.exe
-
Size
1.3MB
-
Sample
210423-hka62dhgze
-
MD5
ce572029aaca7d1613ec12caf4bcd431
-
SHA1
ff71ea43c2af9304e2c3a61bb1f54879d092683e
-
SHA256
be1f798fcf2591f54609b93ae15d8eccad68946aa02eebd48d7b8f015e468809
-
SHA512
e3d419d1db0b335270696fc93f2f1c71919ea13e0622fe37976f6f1e75e95d0a34b5a0c83fbde270c4b5e02d850dd88958c6540e070e910fb2342a7b7be6dc35
Static task
static1
Behavioral task
behavioral1
Sample
Vid_439430_pac_934843.exe
Resource
win7v20210410
Malware Config
Extracted
remcos
sungito.zklg.net:4033
Targets
-
-
Target
Vid_439430_pac_934843.exe
-
Size
1.3MB
-
MD5
ce572029aaca7d1613ec12caf4bcd431
-
SHA1
ff71ea43c2af9304e2c3a61bb1f54879d092683e
-
SHA256
be1f798fcf2591f54609b93ae15d8eccad68946aa02eebd48d7b8f015e468809
-
SHA512
e3d419d1db0b335270696fc93f2f1c71919ea13e0622fe37976f6f1e75e95d0a34b5a0c83fbde270c4b5e02d850dd88958c6540e070e910fb2342a7b7be6dc35
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-