General
-
Target
0fbceb4a8af5ab7e3267616253254d75.exe
-
Size
1.4MB
-
Sample
210506-rdll4cvqta
-
MD5
ccc2e680bdf80b7037b28a20baab2d99
-
SHA1
ae83ff5f0c48c1848a06b5ed247119380907446f
-
SHA256
0b7eaab988ec406ce0b6df31d9abdc68e535c529c6ac5b5a5c9deb4e4fbe6611
-
SHA512
1eda3dc6d2e2b045bd275ca061e870a440560bf64da43d35c23be24bea85f09f6c568659aa12ae7a03e815bd171a03747c8aefedbfd4dd0056d0a229e2c6def2
Static task
static1
Behavioral task
behavioral1
Sample
0fbceb4a8af5ab7e3267616253254d75.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
0fbceb4a8af5ab7e3267616253254d75.exe
Resource
win10v20210410
Malware Config
Extracted
remcos
sandshoe.myfirewall.org:2404
sandshoe.myfirewall.org:2415
Targets
-
-
Target
0fbceb4a8af5ab7e3267616253254d75.exe
-
Size
1.4MB
-
MD5
ccc2e680bdf80b7037b28a20baab2d99
-
SHA1
ae83ff5f0c48c1848a06b5ed247119380907446f
-
SHA256
0b7eaab988ec406ce0b6df31d9abdc68e535c529c6ac5b5a5c9deb4e4fbe6611
-
SHA512
1eda3dc6d2e2b045bd275ca061e870a440560bf64da43d35c23be24bea85f09f6c568659aa12ae7a03e815bd171a03747c8aefedbfd4dd0056d0a229e2c6def2
Score10/10-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-