General
-
Target
Invoice_#01.js
-
Size
9KB
-
Sample
210728-kxl9p22j5x
-
MD5
758a8716e34bdc7cc046fcb9383216d9
-
SHA1
5faac5dd55211b967333205e71b9d934b14e88b5
-
SHA256
a1ee2ea563a62ce42f154749f225613c13b6c5568a0e4d955a2c09895ac1a26e
-
SHA512
1fba12f0bc766bcd8ebc3203dd2ef833f0f34f4fd53f435d9f224e97ba450886bb6ecf1aab92cc912a7eaa3e31e100f650a386051438449fcc01f01afa9acbb7
Static task
static1
Behavioral task
behavioral1
Sample
Invoice_#01.js
Resource
win7v20210410
Behavioral task
behavioral2
Sample
Invoice_#01.js
Resource
win10v20210408
Malware Config
Targets
-
-
Target
Invoice_#01.js
-
Size
9KB
-
MD5
758a8716e34bdc7cc046fcb9383216d9
-
SHA1
5faac5dd55211b967333205e71b9d934b14e88b5
-
SHA256
a1ee2ea563a62ce42f154749f225613c13b6c5568a0e4d955a2c09895ac1a26e
-
SHA512
1fba12f0bc766bcd8ebc3203dd2ef833f0f34f4fd53f435d9f224e97ba450886bb6ecf1aab92cc912a7eaa3e31e100f650a386051438449fcc01f01afa9acbb7
Score10/10-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-