General
-
Target
5da1af6e9a9f3118879eedf865cb939711cc9302c12d1d515d2c034428d14f2d
-
Size
1.1MB
-
Sample
210509-45lnp2e73a
-
MD5
25fb2cb30a5483591c4c7fb0fc941e39
-
SHA1
39e4c66cc4d4d30d4676ea03f0465711761a69ed
-
SHA256
5da1af6e9a9f3118879eedf865cb939711cc9302c12d1d515d2c034428d14f2d
-
SHA512
27ddff6651dba3528624536b6f26bb98834604edadd041414397d70cb8d982bb302a1dc03b7ae87102051a2aa1187d85f4862eca180d3dae03092fb2384e9d8b
Static task
static1
Behavioral task
behavioral1
Sample
5da1af6e9a9f3118879eedf865cb939711cc9302c12d1d515d2c034428d14f2d.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
5da1af6e9a9f3118879eedf865cb939711cc9302c12d1d515d2c034428d14f2d.exe
Resource
win10v20210410
Malware Config
Extracted
remcos
daya4659.ddns.net:8282
Targets
-
-
Target
5da1af6e9a9f3118879eedf865cb939711cc9302c12d1d515d2c034428d14f2d
-
Size
1.1MB
-
MD5
25fb2cb30a5483591c4c7fb0fc941e39
-
SHA1
39e4c66cc4d4d30d4676ea03f0465711761a69ed
-
SHA256
5da1af6e9a9f3118879eedf865cb939711cc9302c12d1d515d2c034428d14f2d
-
SHA512
27ddff6651dba3528624536b6f26bb98834604edadd041414397d70cb8d982bb302a1dc03b7ae87102051a2aa1187d85f4862eca180d3dae03092fb2384e9d8b
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-