General
-
Target
Image_0076643387005313_JPEG.jar
-
Size
72KB
-
Sample
201027-dcbzygyb4a
-
MD5
acbf2c54168796646a4f50d697f5b739
-
SHA1
a763accf3db141b6407630e6f7b070ef585d4048
-
SHA256
c5be24f2b7855a0caad13979c9e1192f36cd121108b488a134d6db67c37c2c6d
-
SHA512
3f1bbe41c8f09dd3d453c2029239b8553d246071da83bfb69c1e84d45bbd1a3806116032f840445de42f98478bfdf60bad053af355396dca9c0b6f84835ab653
Static task
static1
Behavioral task
behavioral1
Sample
Image_0076643387005313_JPEG.jar
Resource
win7
Behavioral task
behavioral2
Sample
Image_0076643387005313_JPEG.jar
Resource
win10
Malware Config
Targets
-
-
Target
Image_0076643387005313_JPEG.jar
-
Size
72KB
-
MD5
acbf2c54168796646a4f50d697f5b739
-
SHA1
a763accf3db141b6407630e6f7b070ef585d4048
-
SHA256
c5be24f2b7855a0caad13979c9e1192f36cd121108b488a134d6db67c37c2c6d
-
SHA512
3f1bbe41c8f09dd3d453c2029239b8553d246071da83bfb69c1e84d45bbd1a3806116032f840445de42f98478bfdf60bad053af355396dca9c0b6f84835ab653
Score10/10-
Executes dropped EXE
-
Adds Run key to start application
-
JavaScript code in executable
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-