General
-
Target
kronos.js
-
Size
2.5MB
-
Sample
210113-yc4pvr7av2
-
MD5
d7445ce4be501700003a79023147e9b9
-
SHA1
2d80ceba1af9a16ef2b8186c5f46a19e984837f3
-
SHA256
6bb71d8bf32cceef6a431136e0c965aa905c45c240b40bb20aa6fb6f661300f3
-
SHA512
61d1c6d20b793b3f47143db918b66f8968cb43b0f5aee20d73ce009e6c2f924336a7f58b10ba631bff164371a9e80787ae3ac50caaa1943b57750b788db3ddc2
Static task
static1
Behavioral task
behavioral1
Sample
kronos.js
Resource
win7v20201028
Malware Config
Targets
-
-
Target
kronos.js
-
Size
2.5MB
-
MD5
d7445ce4be501700003a79023147e9b9
-
SHA1
2d80ceba1af9a16ef2b8186c5f46a19e984837f3
-
SHA256
6bb71d8bf32cceef6a431136e0c965aa905c45c240b40bb20aa6fb6f661300f3
-
SHA512
61d1c6d20b793b3f47143db918b66f8968cb43b0f5aee20d73ce009e6c2f924336a7f58b10ba631bff164371a9e80787ae3ac50caaa1943b57750b788db3ddc2
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-