General
-
Target
Requerimiento.js
-
Size
717KB
-
Sample
210420-a6dmjq1pke
-
MD5
43fd28ecaeace181efbcf9c92beba372
-
SHA1
e02d5fa5f91ddc86a7b9d0430f2dece655642883
-
SHA256
0d429448ceb1cd9b1412757154eaa58e5b08034b65dcd2e77439d617e9bd4944
-
SHA512
70aa32aa6718ea1304761a75fa3aa66da9efae297c5bd81c8d4502efb56f4cfbb4021c6b6740daf11948c591cb6d37f99046d00c7d1ad2aa7f3256f05745021b
Static task
static1
Behavioral task
behavioral1
Sample
Requerimiento.js
Resource
win7v20210410
Behavioral task
behavioral2
Sample
Requerimiento.js
Resource
win10v20210408
Malware Config
Targets
-
-
Target
Requerimiento.js
-
Size
717KB
-
MD5
43fd28ecaeace181efbcf9c92beba372
-
SHA1
e02d5fa5f91ddc86a7b9d0430f2dece655642883
-
SHA256
0d429448ceb1cd9b1412757154eaa58e5b08034b65dcd2e77439d617e9bd4944
-
SHA512
70aa32aa6718ea1304761a75fa3aa66da9efae297c5bd81c8d4502efb56f4cfbb4021c6b6740daf11948c591cb6d37f99046d00c7d1ad2aa7f3256f05745021b
Score10/10-
Blocklisted process makes network request
-
Executes dropped EXE
-
Drops startup file
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-