General
-
Target
FMDWF510190.js
-
Size
164KB
-
Sample
210113-hagn1sm1sa
-
MD5
60d543f82d9bf3f6c674b80695ad9e5e
-
SHA1
bb319387531c12599448d05f51ef1b9cc9f725d2
-
SHA256
47483768f06311345c545c2774ef3592dfd568ed2172690d67e97b871fbb5dae
-
SHA512
df8ad70f5ef6a2cf754aea1a3fa22c3a76f8fbb90f67cbe14d841f2be3fa84a4e9d37e3a90c0c9a01b02e6862c7e82cba19eb7fe7b3d26c23cf9132f5e671dc0
Static task
static1
Behavioral task
behavioral1
Sample
FMDWF510190.js
Resource
win7v20201028
Behavioral task
behavioral2
Sample
FMDWF510190.js
Resource
win10v20201028
Malware Config
Targets
-
-
Target
FMDWF510190.js
-
Size
164KB
-
MD5
60d543f82d9bf3f6c674b80695ad9e5e
-
SHA1
bb319387531c12599448d05f51ef1b9cc9f725d2
-
SHA256
47483768f06311345c545c2774ef3592dfd568ed2172690d67e97b871fbb5dae
-
SHA512
df8ad70f5ef6a2cf754aea1a3fa22c3a76f8fbb90f67cbe14d841f2be3fa84a4e9d37e3a90c0c9a01b02e6862c7e82cba19eb7fe7b3d26c23cf9132f5e671dc0
Score7/10-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
JavaScript code in executable
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-