General
-
Target
DHL_Nov 2020 at 1.30_8BZ290_JPG.jar
-
Size
80KB
-
Sample
201109-w7h2d5k3h2
-
MD5
bc9bc1344ede28241a766c62d8e9b85c
-
SHA1
69b27db9abbcb789446ca58bef12114bace70522
-
SHA256
6298a35bbd71c83523d72cccf0e868d3a2c1bfd1e96429c381d527b85d29ef69
-
SHA512
3ff826eba8a9bbc6e87e16b2b96a157af3ecc5ceb042068cc216ac339540ca8dc68b0f706273cd57a53fc2c18248bba191fd59c5394de06812a0b8258eab3385
Static task
static1
Behavioral task
behavioral1
Sample
DHL_Nov 2020 at 1.30_8BZ290_JPG.jar
Resource
win7v20201028
Behavioral task
behavioral2
Sample
DHL_Nov 2020 at 1.30_8BZ290_JPG.jar
Resource
win10v20201028
Malware Config
Targets
-
-
Target
DHL_Nov 2020 at 1.30_8BZ290_JPG.jar
-
Size
80KB
-
MD5
bc9bc1344ede28241a766c62d8e9b85c
-
SHA1
69b27db9abbcb789446ca58bef12114bace70522
-
SHA256
6298a35bbd71c83523d72cccf0e868d3a2c1bfd1e96429c381d527b85d29ef69
-
SHA512
3ff826eba8a9bbc6e87e16b2b96a157af3ecc5ceb042068cc216ac339540ca8dc68b0f706273cd57a53fc2c18248bba191fd59c5394de06812a0b8258eab3385
Score10/10-
Executes dropped EXE
-
Adds Run key to start application
-
JavaScript code in executable
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-