General
-
Target
ACCORD POUR COMMISSION A PRELEVER.PDF.vbs
-
Size
246KB
-
Sample
200727-l5jrnfh3sx
-
MD5
6b23cda6ddc86713d63e5b6bb853a909
-
SHA1
7c12556e23a5b283846572fc9a1d70b01d306c1d
-
SHA256
3cdadd4d8492cfe342f9f74529566ed6c1b451ba669509b59ffaf2965bce0750
-
SHA512
9bd88a406202b539ec6cfb271c7c02b0ac2659d3c925aed20d1680d919f841fbef89566d33f29cca2fd1ebd5641b5a7ee17562eaa5dce447f89256cc470f1eeb
Static task
static1
Behavioral task
behavioral1
Sample
ACCORD POUR COMMISSION A PRELEVER.PDF.vbs
Resource
win7
Behavioral task
behavioral2
Sample
ACCORD POUR COMMISSION A PRELEVER.PDF.vbs
Resource
win10
Malware Config
Targets
-
-
Target
ACCORD POUR COMMISSION A PRELEVER.PDF.vbs
-
Size
246KB
-
MD5
6b23cda6ddc86713d63e5b6bb853a909
-
SHA1
7c12556e23a5b283846572fc9a1d70b01d306c1d
-
SHA256
3cdadd4d8492cfe342f9f74529566ed6c1b451ba669509b59ffaf2965bce0750
-
SHA512
9bd88a406202b539ec6cfb271c7c02b0ac2659d3c925aed20d1680d919f841fbef89566d33f29cca2fd1ebd5641b5a7ee17562eaa5dce447f89256cc470f1eeb
Score8/10-
Blacklisted process makes network request
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
JavaScript code in executable
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-