General
-
Target
Invoice.jar
-
Size
120KB
-
Sample
201105-25mbygcyvn
-
MD5
391eab24cb9b95597be7a1b690b024e9
-
SHA1
c302d181956e35c1ab8ccbf6da575673725c920a
-
SHA256
032ceead01998c59d55d9fa60642e9708e5e1073e10c86f1abb2c3f5443a3c03
-
SHA512
0170562462b01bc48429ffe53035b5b1e5e59c2492cf79cc150b517ae9426e8cf41c2bfa7fc92a2664194bba77cfda0957de53ac98cf06d3720ec49217e59b94
Static task
static1
Behavioral task
behavioral1
Sample
Invoice.jar
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Invoice.jar
Resource
win10v20201028
Malware Config
Targets
-
-
Target
Invoice.jar
-
Size
120KB
-
MD5
391eab24cb9b95597be7a1b690b024e9
-
SHA1
c302d181956e35c1ab8ccbf6da575673725c920a
-
SHA256
032ceead01998c59d55d9fa60642e9708e5e1073e10c86f1abb2c3f5443a3c03
-
SHA512
0170562462b01bc48429ffe53035b5b1e5e59c2492cf79cc150b517ae9426e8cf41c2bfa7fc92a2664194bba77cfda0957de53ac98cf06d3720ec49217e59b94
Score10/10-
Executes dropped EXE
-
Adds Run key to start application
-
JavaScript code in executable
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-