General
-
Target
Rut.js
-
Size
412KB
-
Sample
210421-vv5k2y6ecs
-
MD5
b90b295157b57ba84dd525b8a0788cea
-
SHA1
b58705476941038c5c0f4e0604c55276c8fc2096
-
SHA256
6e348ed0aac3c01961f86af5fe843e1e1c5d2d977ea62eea7960efbb6a1c78fd
-
SHA512
e291cd979fc2e75c308b4b98fe8f45e3b2ed1bb416825c0b52a588b6b2268695a5d6f4beed6f6817741368691d9acb98bad9229e9166bad023698d0393bd77b4
Static task
static1
Behavioral task
behavioral1
Sample
Rut.js
Resource
win7v20210410
Behavioral task
behavioral2
Sample
Rut.js
Resource
win10v20210408
Malware Config
Targets
-
-
Target
Rut.js
-
Size
412KB
-
MD5
b90b295157b57ba84dd525b8a0788cea
-
SHA1
b58705476941038c5c0f4e0604c55276c8fc2096
-
SHA256
6e348ed0aac3c01961f86af5fe843e1e1c5d2d977ea62eea7960efbb6a1c78fd
-
SHA512
e291cd979fc2e75c308b4b98fe8f45e3b2ed1bb416825c0b52a588b6b2268695a5d6f4beed6f6817741368691d9acb98bad9229e9166bad023698d0393bd77b4
Score10/10-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-