General
-
Target
Factura Serfinanza049678941875683878450087827.exe
-
Size
196KB
-
Sample
210426-ypd3h1wnwa
-
MD5
23630bf8b6f0832cb04df9f462fe6a4c
-
SHA1
a7543a9eea778b009aada70657c132c0bd5e444d
-
SHA256
e547d52177207f8352766cd1e689e5f4891fb844367e12a1b6e04bca4d17ef58
-
SHA512
8219e590e57cf67d000d126843825ca615e0c39b2f5425641fc353023295261c4bf93070f72046d62ff00061c338f11cce63bbb28d24c14e3e843ff98d9ba7da
Static task
static1
Behavioral task
behavioral1
Sample
Factura Serfinanza049678941875683878450087827.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
Factura Serfinanza049678941875683878450087827.exe
Resource
win10v20210408
Malware Config
Extracted
remcos
databasepropersonombrecomercialideasearchwords.services:3521
Targets
-
-
Target
Factura Serfinanza049678941875683878450087827.exe
-
Size
196KB
-
MD5
23630bf8b6f0832cb04df9f462fe6a4c
-
SHA1
a7543a9eea778b009aada70657c132c0bd5e444d
-
SHA256
e547d52177207f8352766cd1e689e5f4891fb844367e12a1b6e04bca4d17ef58
-
SHA512
8219e590e57cf67d000d126843825ca615e0c39b2f5425641fc353023295261c4bf93070f72046d62ff00061c338f11cce63bbb28d24c14e3e843ff98d9ba7da
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-