General
-
Target
UPS_AD12300AW_1290499D.jar
-
Size
77KB
-
Sample
201023-g17f9e5mze
-
MD5
53c0c382644adebe67a8af12d50cd35e
-
SHA1
8850f62e32c9f89bd4dc4ae419ef51b4b3009207
-
SHA256
c882fc449cd0ca0348938fec76bd0200a3aeadb6d874728b5f15ade967c72c17
-
SHA512
57f9c30622c671348dd683a423ed5c69cee8d61873c1b14c3207641a990fd8712198feb5204d940b7c52c11586d9af60cc066e1af5a133c7f4dcbc0a10198aa4
Static task
static1
Behavioral task
behavioral1
Sample
UPS_AD12300AW_1290499D.jar
Resource
win7
Behavioral task
behavioral2
Sample
UPS_AD12300AW_1290499D.jar
Resource
win10
Malware Config
Targets
-
-
Target
UPS_AD12300AW_1290499D.jar
-
Size
77KB
-
MD5
53c0c382644adebe67a8af12d50cd35e
-
SHA1
8850f62e32c9f89bd4dc4ae419ef51b4b3009207
-
SHA256
c882fc449cd0ca0348938fec76bd0200a3aeadb6d874728b5f15ade967c72c17
-
SHA512
57f9c30622c671348dd683a423ed5c69cee8d61873c1b14c3207641a990fd8712198feb5204d940b7c52c11586d9af60cc066e1af5a133c7f4dcbc0a10198aa4
Score10/10-
Executes dropped EXE
-
Adds Run key to start application
-
JavaScript code in executable
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-