General
-
Target
jooyu.exe
-
Size
971KB
-
Sample
210821-7bj2nl5zvx
-
MD5
aed57d50123897b0012c35ef5dec4184
-
SHA1
568571b12ca44a585df589dc810bf53adf5e8050
-
SHA256
096021eb5950ee16b7ec51756abe05f90c3530206e16286e7610b8a5a544a85e
-
SHA512
ea0ee3a0762baa3539e8026a8c624ad897efe005faadcf1ff67ebfc555f29b912b24ad4342d5e0c209f36f5288867246bd1bdfed7df739e608a72fa7b4fa2d7c
Static task
static1
Behavioral task
behavioral1
Sample
jooyu.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
jooyu.exe
Resource
win10v20210408
Malware Config
Targets
-
-
Target
jooyu.exe
-
Size
971KB
-
MD5
aed57d50123897b0012c35ef5dec4184
-
SHA1
568571b12ca44a585df589dc810bf53adf5e8050
-
SHA256
096021eb5950ee16b7ec51756abe05f90c3530206e16286e7610b8a5a544a85e
-
SHA512
ea0ee3a0762baa3539e8026a8c624ad897efe005faadcf1ff67ebfc555f29b912b24ad4342d5e0c209f36f5288867246bd1bdfed7df739e608a72fa7b4fa2d7c
Score8/10-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-