Resubmissions
13-01-2021 06:51
210113-rkhah56hvs 10General
-
Target
readme.js
-
Size
9KB
-
Sample
210113-rkhah56hvs
-
MD5
8a047f4917d75bb0bb6659e41569a9b7
-
SHA1
388ac00a76db82a0ac2434d1b4fb7420bab1a403
-
SHA256
f517526fc57eb33edb832920b1678d52ad1c5cf9c707859551fe065727587501
-
SHA512
0caf75d7adf94e624a6abe947e75e0d80a58fef8e331ee88a65fd24ee1f28e773295defa2cdac01e52ee7ebc8c3a0d2e8bb0676871bccab2fe1ea739b9de41c9
Static task
static1
Behavioral task
behavioral1
Sample
readme.js
Resource
win7v20201028
Behavioral task
behavioral2
Sample
readme.js
Resource
win10v20201028
Malware Config
Extracted
http://t.zz3r0.com
Extracted
http://t.zer9g.com
Extracted
http://t.bb3u9.com
Extracted
http://t.bb3u9.com
Targets
-
-
Target
readme.js
-
Size
9KB
-
MD5
8a047f4917d75bb0bb6659e41569a9b7
-
SHA1
388ac00a76db82a0ac2434d1b4fb7420bab1a403
-
SHA256
f517526fc57eb33edb832920b1678d52ad1c5cf9c707859551fe065727587501
-
SHA512
0caf75d7adf94e624a6abe947e75e0d80a58fef8e331ee88a65fd24ee1f28e773295defa2cdac01e52ee7ebc8c3a0d2e8bb0676871bccab2fe1ea739b9de41c9
Score10/10-
Blocklisted process makes network request
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Stops running service(s)
-
Loads dropped DLL
-
Drops file in System32 directory
-