General
-
Target
Scanned from a Xerox Multifunction Printer.jar
-
Size
71KB
-
Sample
201027-5r5dtp8rme
-
MD5
ef50330c3ba37193196fb2678b81c358
-
SHA1
fedda1f30f37cfbcd7a30fadfb32da968923bc55
-
SHA256
51a266885dd543b93c91be648fd52e64fae3a3af8a17616e86357facb982622f
-
SHA512
ea5a1a3b90f3663dea5408d49b6e453872fd6446d688ac409d9c750478c17b1b8ab2e47ea95e2f1860f9af4cf5b83fbbf806671781c09d6b2e08ef880f23b024
Static task
static1
Behavioral task
behavioral1
Sample
Scanned from a Xerox Multifunction Printer.jar
Resource
win7
Behavioral task
behavioral2
Sample
Scanned from a Xerox Multifunction Printer.jar
Resource
win10
Malware Config
Targets
-
-
Target
Scanned from a Xerox Multifunction Printer.jar
-
Size
71KB
-
MD5
ef50330c3ba37193196fb2678b81c358
-
SHA1
fedda1f30f37cfbcd7a30fadfb32da968923bc55
-
SHA256
51a266885dd543b93c91be648fd52e64fae3a3af8a17616e86357facb982622f
-
SHA512
ea5a1a3b90f3663dea5408d49b6e453872fd6446d688ac409d9c750478c17b1b8ab2e47ea95e2f1860f9af4cf5b83fbbf806671781c09d6b2e08ef880f23b024
Score10/10-
Executes dropped EXE
-
Adds Run key to start application
-
JavaScript code in executable
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-