General
-
Target
Invoice #0916.js
-
Size
3KB
-
Sample
210520-v8dd3c8zwn
-
MD5
b8a96b02e16725f2b872f283c7add748
-
SHA1
5a6f87070e376ade44c81dce6b126f700faac1e4
-
SHA256
a6b13cb06dc5d0650a6cb8f4c38f7f3aacb8fca0ef110102d52a1b0cc8c09afc
-
SHA512
0decac78022fbe1ea68a143cad35c5f77bc5d43cca8ce4f1e89cd20cae8a5f6a1394cf07a7dac1e57626b76a7d07b40a419ac2b0716373ea11bbd1b8ee018dd5
Static task
static1
Behavioral task
behavioral1
Sample
Invoice #0916.js
Resource
win7v20210410
Behavioral task
behavioral2
Sample
Invoice #0916.js
Resource
win10v20210408
Malware Config
Targets
-
-
Target
Invoice #0916.js
-
Size
3KB
-
MD5
b8a96b02e16725f2b872f283c7add748
-
SHA1
5a6f87070e376ade44c81dce6b126f700faac1e4
-
SHA256
a6b13cb06dc5d0650a6cb8f4c38f7f3aacb8fca0ef110102d52a1b0cc8c09afc
-
SHA512
0decac78022fbe1ea68a143cad35c5f77bc5d43cca8ce4f1e89cd20cae8a5f6a1394cf07a7dac1e57626b76a7d07b40a419ac2b0716373ea11bbd1b8ee018dd5
Score10/10-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-