General

  • Target

    1.js

  • Size

    664KB

  • Sample

    210113-fp7br3r4ln

  • MD5

    069e5d7ddc53d96d7320b821537781f7

  • SHA1

    af4116b7136d4cbf37a1a9351958c574348b23e0

  • SHA256

    84e1944968103d32993f8f4b66f8c64a0c11a830242dd79b11b11436945fbde1

  • SHA512

    ee35a4b22cd17363e27e60b5ba259971d1f4d0f5089a03017156a33f841d908e52e6974814d278b7987e46877c3ad4228a33a029445bc38906e2add22de9d3f8

Score
8/10

Malware Config

Targets

    • Target

      1.js

    • Size

      664KB

    • MD5

      069e5d7ddc53d96d7320b821537781f7

    • SHA1

      af4116b7136d4cbf37a1a9351958c574348b23e0

    • SHA256

      84e1944968103d32993f8f4b66f8c64a0c11a830242dd79b11b11436945fbde1

    • SHA512

      ee35a4b22cd17363e27e60b5ba259971d1f4d0f5089a03017156a33f841d908e52e6974814d278b7987e46877c3ad4228a33a029445bc38906e2add22de9d3f8

    Score
    8/10
    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

    • JavaScript code in executable

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks