General
-
Target
1.js
-
Size
664KB
-
Sample
210113-fp7br3r4ln
-
MD5
069e5d7ddc53d96d7320b821537781f7
-
SHA1
af4116b7136d4cbf37a1a9351958c574348b23e0
-
SHA256
84e1944968103d32993f8f4b66f8c64a0c11a830242dd79b11b11436945fbde1
-
SHA512
ee35a4b22cd17363e27e60b5ba259971d1f4d0f5089a03017156a33f841d908e52e6974814d278b7987e46877c3ad4228a33a029445bc38906e2add22de9d3f8
Static task
static1
Behavioral task
behavioral1
Sample
1.js
Resource
win7v20201028
Behavioral task
behavioral2
Sample
1.js
Resource
win10v20201028
Malware Config
Targets
-
-
Target
1.js
-
Size
664KB
-
MD5
069e5d7ddc53d96d7320b821537781f7
-
SHA1
af4116b7136d4cbf37a1a9351958c574348b23e0
-
SHA256
84e1944968103d32993f8f4b66f8c64a0c11a830242dd79b11b11436945fbde1
-
SHA512
ee35a4b22cd17363e27e60b5ba259971d1f4d0f5089a03017156a33f841d908e52e6974814d278b7987e46877c3ad4228a33a029445bc38906e2add22de9d3f8
Score8/10-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-
JavaScript code in executable
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-