General
-
Target
PO KVRQ-7436859-012.js
-
Size
179KB
-
Sample
210113-4vb645wdya
-
MD5
869614f2b681a26d7f1ee690637ee9d2
-
SHA1
b31f9b66665e45e382d6f700153c735c67bdd82c
-
SHA256
6a00522a3bc04a45725e18ec41c81738d905fdf8b3c4859e86ee6a2a6d154b8f
-
SHA512
b6bc5022ff955226fbaa0cab40e6a012c2752febad87ce71a952ee5aad2900f334c3b10fa458055202a92589dfadf1c54a99669c216e85afd0388e2eae3c15bd
Static task
static1
Behavioral task
behavioral1
Sample
PO KVRQ-7436859-012.js
Resource
win7v20201028
Behavioral task
behavioral2
Sample
PO KVRQ-7436859-012.js
Resource
win10v20201028
Malware Config
Targets
-
-
Target
PO KVRQ-7436859-012.js
-
Size
179KB
-
MD5
869614f2b681a26d7f1ee690637ee9d2
-
SHA1
b31f9b66665e45e382d6f700153c735c67bdd82c
-
SHA256
6a00522a3bc04a45725e18ec41c81738d905fdf8b3c4859e86ee6a2a6d154b8f
-
SHA512
b6bc5022ff955226fbaa0cab40e6a012c2752febad87ce71a952ee5aad2900f334c3b10fa458055202a92589dfadf1c54a99669c216e85afd0388e2eae3c15bd
Score8/10-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-
JavaScript code in executable
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-