General
-
Target
ZXOMHSJOPMA.js
-
Size
9KB
-
Sample
210616-edrgyqg1aa
-
MD5
e7b6b4fb18ab115e2f55b97830202746
-
SHA1
9c25aa6c5cce3445c8a08a84e35eece1a2050ab7
-
SHA256
410a7f406af3ce89f468bec2eefc1de50f424344019a5395d3b9e2d9429d2c94
-
SHA512
d3434d6c7d6541670b37d3fb516f83fa5b45d432d15f215a9eb8879089e1d7a375a15bdf6bc1d0c8762671ac3d55836f90a5745d2241a95f116f92591bc1c52c
Static task
static1
Behavioral task
behavioral1
Sample
ZXOMHSJOPMA.js
Resource
win7v20210408
Behavioral task
behavioral2
Sample
ZXOMHSJOPMA.js
Resource
win10v20210410
Malware Config
Targets
-
-
Target
ZXOMHSJOPMA.js
-
Size
9KB
-
MD5
e7b6b4fb18ab115e2f55b97830202746
-
SHA1
9c25aa6c5cce3445c8a08a84e35eece1a2050ab7
-
SHA256
410a7f406af3ce89f468bec2eefc1de50f424344019a5395d3b9e2d9429d2c94
-
SHA512
d3434d6c7d6541670b37d3fb516f83fa5b45d432d15f215a9eb8879089e1d7a375a15bdf6bc1d0c8762671ac3d55836f90a5745d2241a95f116f92591bc1c52c
Score10/10-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-