General
-
Target
ORDER-218105.docx.js
-
Size
647KB
-
Sample
210810-zbfep46vaj
-
MD5
48b712251e849852aac13fb40c12ccc7
-
SHA1
886f19f88ab45e77c6f0dab1e1ad6e75e1b6d133
-
SHA256
a13e8c01a39824718b9beb603a1247e48c98fe9d7b8b2770ecf5ebd7daeb6bb2
-
SHA512
a10408cda86370772a7c0ecfef6b82be9f5a5bed4cb7c847aea80099672ab91349075f47cec8f57fee0a0df6ae1333f99afa10ffcbaa09aa72590f0b40ad37d8
Static task
static1
Behavioral task
behavioral1
Sample
ORDER-218105.docx.js
Resource
win7v20210408
Malware Config
Targets
-
-
Target
ORDER-218105.docx.js
-
Size
647KB
-
MD5
48b712251e849852aac13fb40c12ccc7
-
SHA1
886f19f88ab45e77c6f0dab1e1ad6e75e1b6d133
-
SHA256
a13e8c01a39824718b9beb603a1247e48c98fe9d7b8b2770ecf5ebd7daeb6bb2
-
SHA512
a10408cda86370772a7c0ecfef6b82be9f5a5bed4cb7c847aea80099672ab91349075f47cec8f57fee0a0df6ae1333f99afa10ffcbaa09aa72590f0b40ad37d8
-
Ratty Rat Payload
-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-