General
-
Target
Remittance E-MAIL Layout _ 12_.jar
-
Size
105KB
-
Sample
210519-wl33pjpskj
-
MD5
e2d8f5bdf7e52f80c4d9994a0614cfad
-
SHA1
7586653e324696781f4b8e19f5a008b9e7b74150
-
SHA256
94128ae9a78c975a33e9a3e84022f582332a55ba2ae9ccec22c2b28a85730a97
-
SHA512
510671a333be370e5bb2026048b00fa8782300046f89af33e11537a4bb7b9a17eb07186837cad570e8969cda27acc1741114ef5c9d7c5b8e1c3d367f9447b192
Static task
static1
Behavioral task
behavioral1
Sample
Remittance E-MAIL Layout _ 12_.jar
Resource
win7v20210410
Behavioral task
behavioral2
Sample
Remittance E-MAIL Layout _ 12_.jar
Resource
win10v20210410
Malware Config
Targets
-
-
Target
Remittance E-MAIL Layout _ 12_.jar
-
Size
105KB
-
MD5
e2d8f5bdf7e52f80c4d9994a0614cfad
-
SHA1
7586653e324696781f4b8e19f5a008b9e7b74150
-
SHA256
94128ae9a78c975a33e9a3e84022f582332a55ba2ae9ccec22c2b28a85730a97
-
SHA512
510671a333be370e5bb2026048b00fa8782300046f89af33e11537a4bb7b9a17eb07186837cad570e8969cda27acc1741114ef5c9d7c5b8e1c3d367f9447b192
Score10/10-
Executes dropped EXE
-
Deletes itself
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-