General
-
Target
invoice ADP55192.js
-
Size
3KB
-
Sample
210420-pnwphlx8dn
-
MD5
fde76f715ef9998d15cd7a628eb5e0c8
-
SHA1
2d3b29ad2314b28c2e716b129bd01cb8fa5c791f
-
SHA256
f70d57a798b932543ba16872ae572f41277b498df1bb6b9a851cf950e4df0f98
-
SHA512
d0eeb87421a635652cb07e8ff3267b45be3dd7784754c06467219282b74220a51353982ffc3899084790dffe9dc1cbf548f674b4c66da0ad8397ce6b7609ccd6
Static task
static1
Behavioral task
behavioral1
Sample
invoice ADP55192.js
Resource
win7v20210410
Behavioral task
behavioral2
Sample
invoice ADP55192.js
Resource
win10v20210408
Malware Config
Targets
-
-
Target
invoice ADP55192.js
-
Size
3KB
-
MD5
fde76f715ef9998d15cd7a628eb5e0c8
-
SHA1
2d3b29ad2314b28c2e716b129bd01cb8fa5c791f
-
SHA256
f70d57a798b932543ba16872ae572f41277b498df1bb6b9a851cf950e4df0f98
-
SHA512
d0eeb87421a635652cb07e8ff3267b45be3dd7784754c06467219282b74220a51353982ffc3899084790dffe9dc1cbf548f674b4c66da0ad8397ce6b7609ccd6
Score10/10-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-