General
-
Target
Invoice#UGG4920.js
-
Size
3KB
-
Sample
210415-gdmdxn5ytn
-
MD5
5845bba204893a2899990c6f119536d8
-
SHA1
9545255f64fecd47dd67f83f997d344f788a7770
-
SHA256
93875d799ab91a2cc3f21fe899a7e167053d3e2013430792ab997c1dbd40fbfb
-
SHA512
d9a5cc3cfb67144ff8c5daeaad8a5545a16ae04e91100b144a66b49ab093462bfd4eca689159aef0ade87efb0113466fd058b4234200baa4ff8620af6725c70f
Static task
static1
Behavioral task
behavioral1
Sample
Invoice#UGG4920.js
Resource
win7v20210410
Behavioral task
behavioral2
Sample
Invoice#UGG4920.js
Resource
win10v20210408
Malware Config
Targets
-
-
Target
Invoice#UGG4920.js
-
Size
3KB
-
MD5
5845bba204893a2899990c6f119536d8
-
SHA1
9545255f64fecd47dd67f83f997d344f788a7770
-
SHA256
93875d799ab91a2cc3f21fe899a7e167053d3e2013430792ab997c1dbd40fbfb
-
SHA512
d9a5cc3cfb67144ff8c5daeaad8a5545a16ae04e91100b144a66b49ab093462bfd4eca689159aef0ade87efb0113466fd058b4234200baa4ff8620af6725c70f
Score10/10-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-