General
-
Target
VEM RFQ.jar
-
Size
59KB
-
Sample
201109-ajpld93yva
-
MD5
e2b4ab7ed54f4e7c2f255bb3070af2b2
-
SHA1
3bfa10831153ac3c856dc1f4a51ba642648a71d4
-
SHA256
c31445f4089c2a9018e9da605a5e71ddaeb2b70f480e74acbd5a494d1e44ef15
-
SHA512
bf7420d3cbf93c365ba2255780354c1523e6d68921e93e551440b91989d375e8a70d9e6297539552251165b68d31c17ed4e13b18acd7dbc061121a68eabfc8b6
Static task
static1
Behavioral task
behavioral1
Sample
VEM RFQ.jar
Resource
win7v20201028
Behavioral task
behavioral2
Sample
VEM RFQ.jar
Resource
win10v20201028
Malware Config
Targets
-
-
Target
VEM RFQ.jar
-
Size
59KB
-
MD5
e2b4ab7ed54f4e7c2f255bb3070af2b2
-
SHA1
3bfa10831153ac3c856dc1f4a51ba642648a71d4
-
SHA256
c31445f4089c2a9018e9da605a5e71ddaeb2b70f480e74acbd5a494d1e44ef15
-
SHA512
bf7420d3cbf93c365ba2255780354c1523e6d68921e93e551440b91989d375e8a70d9e6297539552251165b68d31c17ed4e13b18acd7dbc061121a68eabfc8b6
Score10/10-
Executes dropped EXE
-
Adds Run key to start application
-
JavaScript code in executable
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-