General
-
Target
Invoice.zip
-
Size
4KB
-
Sample
210413-xz8shqwmkj
-
MD5
e955a57d1293c6e8870e9512faf41a48
-
SHA1
7b6169dc5fc0ba7921c2a9ea444aaa8ef8dc679a
-
SHA256
df00bcea8a8142b829ec1cef0561e456f7da68b97f7f8ba951762f4e64f41697
-
SHA512
2855d40dc190381398f9355bda4ff6d868949ce1d1caaadd50cb5dbc8be712caa897e6b5c4cba6d62640931a84c7d048c512d0165223f35f75b4181bd9540d67
Static task
static1
Behavioral task
behavioral1
Sample
Invoice.js
Resource
win7v20210410
Behavioral task
behavioral2
Sample
Invoice.js
Resource
win10v20210408
Malware Config
Targets
-
-
Target
Invoice.js
-
Size
3KB
-
MD5
015f5153e12c7c2af015276690188d1c
-
SHA1
c2a1a42b90ff4235898d92b68a4b3217a0321d4c
-
SHA256
de9b4dcb5d1d41d031f4e66730d9dd51f4b447d66d736c6219bb5e5d02d27f2d
-
SHA512
7a540e840eae97e2c80d02017ae3a4d5e931e2f47a3b520106de59292fb64935e6ab3666be470ff0d8a0a8a4c8c1df1f4b097e9840a4da4cf34d981e10988419
Score10/10-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-