General
-
Target
R.F.Q.jar
-
Size
95KB
-
Sample
201117-tx39f9wjvj
-
MD5
75fe28262beff3cba941aa30438c2efb
-
SHA1
656b9cfaf5dfee343e476b47950243ce60c5751f
-
SHA256
8e51f941e056b959365021f58210ed34dbadab3890b95090987db6f87ba6ff58
-
SHA512
4873383f9aef1086a186681f2a2c6ea23be8f7e0573522fde786c2355068ff62801068977f970186628fbb6be8df6f46a627b67553c646c85c35d82c66dba0a9
Static task
static1
Behavioral task
behavioral1
Sample
R.F.Q.jar
Resource
win7v20201028
Behavioral task
behavioral2
Sample
R.F.Q.jar
Resource
win10v20201028
Malware Config
Targets
-
-
Target
R.F.Q.jar
-
Size
95KB
-
MD5
75fe28262beff3cba941aa30438c2efb
-
SHA1
656b9cfaf5dfee343e476b47950243ce60c5751f
-
SHA256
8e51f941e056b959365021f58210ed34dbadab3890b95090987db6f87ba6ff58
-
SHA512
4873383f9aef1086a186681f2a2c6ea23be8f7e0573522fde786c2355068ff62801068977f970186628fbb6be8df6f46a627b67553c646c85c35d82c66dba0a9
Score10/10-
Executes dropped EXE
-
Adds Run key to start application
-
JavaScript code in executable
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-