General
-
Target
list of equipment_puma_pdf.jar
-
Size
258KB
-
Sample
201005-djf6l11372
-
MD5
9d5548aa1a52a4fd8cc9ad1c64a23a09
-
SHA1
72474bd84027c0aa72b09c3f48e1c57ecf935bb2
-
SHA256
0d7b48039793c6f044e4d7b6f42898adbe1e9d722ec37a12c7073cdfffa63db6
-
SHA512
c73296d0b6cd972a90eef0e7a4c32874cf190cf2d545f2f1338ce2d3bf7dfc784a46bf514be6b7d2ebb92124e610c86667a53f7d3ebe5c31a5791a6ef8e90eb6
Static task
static1
Behavioral task
behavioral1
Sample
list of equipment_puma_pdf.jar
Resource
win7
Behavioral task
behavioral2
Sample
list of equipment_puma_pdf.jar
Resource
win10v200722
Malware Config
Targets
-
-
Target
list of equipment_puma_pdf.jar
-
Size
258KB
-
MD5
9d5548aa1a52a4fd8cc9ad1c64a23a09
-
SHA1
72474bd84027c0aa72b09c3f48e1c57ecf935bb2
-
SHA256
0d7b48039793c6f044e4d7b6f42898adbe1e9d722ec37a12c7073cdfffa63db6
-
SHA512
c73296d0b6cd972a90eef0e7a4c32874cf190cf2d545f2f1338ce2d3bf7dfc784a46bf514be6b7d2ebb92124e610c86667a53f7d3ebe5c31a5791a6ef8e90eb6
Score10/10-
Executes dropped EXE
-
Adds Run key to start application
-
JavaScript code in executable
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-