General
-
Target
DHL_OCT 2020 at 10.M_9B7290.jar
-
Size
276KB
-
Sample
201015-6kyqf948s2
-
MD5
553b81b7698957eb7221311b5fa9bb6b
-
SHA1
12df85af7e23edc08fcdc6ebc0d8c5cd543e45ce
-
SHA256
dfa4ffb05bc1416ff28302312f1929d7d394755f59ae36a4fc0b8797650256e7
-
SHA512
cb9fe94260a341d9903d246531bf252a18c7b078d69f8c6bd2affaf2272f108b6c3df6c9a0467540e464946471f11bacdeeda0e4ccba6ad47793f86cde5e2257
Static task
static1
Behavioral task
behavioral1
Sample
DHL_OCT 2020 at 10.M_9B7290.jar
Resource
win7
Behavioral task
behavioral2
Sample
DHL_OCT 2020 at 10.M_9B7290.jar
Resource
win10
Malware Config
Targets
-
-
Target
DHL_OCT 2020 at 10.M_9B7290.jar
-
Size
276KB
-
MD5
553b81b7698957eb7221311b5fa9bb6b
-
SHA1
12df85af7e23edc08fcdc6ebc0d8c5cd543e45ce
-
SHA256
dfa4ffb05bc1416ff28302312f1929d7d394755f59ae36a4fc0b8797650256e7
-
SHA512
cb9fe94260a341d9903d246531bf252a18c7b078d69f8c6bd2affaf2272f108b6c3df6c9a0467540e464946471f11bacdeeda0e4ccba6ad47793f86cde5e2257
Score10/10-
Executes dropped EXE
-
Adds Run key to start application
-
JavaScript code in executable
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-