General
-
Target
ACTA JUDICIAL DEMANDA Y CONVOCATORIA AUDIENCIA Tribunal correspondiente.rar
-
Size
1.2MB
-
Sample
230516-z8g58abg5v
-
MD5
dadd3160126640b58fd288d68d2ab2cc
-
SHA1
ab30600c81c3ffd2e96a3ea6147afd704219fc87
-
SHA256
40e7707233efd5935367b041f8dbfdd5237b3efbdde7dec15ce38f1152bd6a16
-
SHA512
be0426698a6286f890e05d00d0e8ce9a32bdefdab561f7d70fcc48ace3d778841b42d51cd4de724edb54f6d8988f7ea2848820a5f5d9b9e1f4b4a6560c43f75e
-
SSDEEP
24576:qNesK3ALHOHXQIOi2FQJeUjgbA6DR3f+6+vpmd75o6CRWB66qGooZVt/NLoIv:qNev36xieVKgbA6Ff+61DuRWB67wZfNz
Static task
static1
Behavioral task
behavioral1
Sample
ACTA JUDICIAL DEMANDA Y CONVOCATORIA AUDIENCIA Tribunal correspondiente.rar
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ACTA JUDICIAL DEMANDA Y CONVOCATORIA AUDIENCIA Tribunal correspondiente.rar
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
ACTA JUDICIAL DEMANDA Y CONVOCATORIA AUDIENCIA Tribunal correspondiente.exe
Resource
win7-20230220-en
Malware Config
Extracted
remcos
XXXxxx
iessecuador.con-ip.com:2434
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
Antiviruswin.exe
-
copy_folder
Antiviruswin
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
false
-
install_path
ApplicationPath
-
keylog_crypt
false
-
keylog_file
AntiviruswsDindsss.dat
-
keylog_flag
false
-
keylog_folder
AntiviruswinssDdss
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
iruswinsSds-S8REEC
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Antiviruswin
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
ACTA JUDICIAL DEMANDA Y CONVOCATORIA AUDIENCIA Tribunal correspondiente.rar
-
Size
1.2MB
-
MD5
dadd3160126640b58fd288d68d2ab2cc
-
SHA1
ab30600c81c3ffd2e96a3ea6147afd704219fc87
-
SHA256
40e7707233efd5935367b041f8dbfdd5237b3efbdde7dec15ce38f1152bd6a16
-
SHA512
be0426698a6286f890e05d00d0e8ce9a32bdefdab561f7d70fcc48ace3d778841b42d51cd4de724edb54f6d8988f7ea2848820a5f5d9b9e1f4b4a6560c43f75e
-
SSDEEP
24576:qNesK3ALHOHXQIOi2FQJeUjgbA6DR3f+6+vpmd75o6CRWB66qGooZVt/NLoIv:qNev36xieVKgbA6Ff+61DuRWB67wZfNz
Score3/10 -
-
-
Target
ACTA JUDICIAL DEMANDA Y CONVOCATORIA AUDIENCIA Tribunal correspondiente.exe
-
Size
1023.9MB
-
MD5
df259cf21a744992fe2b8dd1bd6c086b
-
SHA1
85244cd5963a60c7df806aecc5636be3df1af60b
-
SHA256
e803b7421aa3bd70991445974558ef0955cc84e260222e5cac8b28a4ebb7e6b0
-
SHA512
f83b5dd3f2e4d4758495ab743fada38a0c0ddd009253b56b05c35c80f937ab0131a7a3eac670e8647bb7329665c4e733e28020c91c06e6da9429044b88c3efca
-
SSDEEP
12288:8+oLQCYc+ZErVrDGAjiBJccoeSIB9FikLyBs/hGmAT2T/SmtBFZA4nMmE:810UpTuIcorhs5GmATKtBFFnvE
-
Executes dropped EXE
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-