General
-
Target
eVoucher.js
-
Size
30KB
-
Sample
210831-bc54193n8x
-
MD5
ef30d08be6b02f148da164e54892c8e3
-
SHA1
4998edfd067f343a56e03422d3913c1cc7066e4b
-
SHA256
e21dba51d9968a1073d43143b7acbd4179a8fa73fc5f48921eabac7ea9869daa
-
SHA512
9e1b1142248c8088c2ecb2bd33887136e4f39c3590ce3b95f2fa5e93b922a07c7ecd598650d91a7ee93c4f018b898a96e49ed41157be607abf1b1ce9845c72c1
Static task
static1
Behavioral task
behavioral1
Sample
eVoucher.js
Resource
win7v20210408
Behavioral task
behavioral2
Sample
eVoucher.js
Resource
win10v20210410
Malware Config
Targets
-
-
Target
eVoucher.js
-
Size
30KB
-
MD5
ef30d08be6b02f148da164e54892c8e3
-
SHA1
4998edfd067f343a56e03422d3913c1cc7066e4b
-
SHA256
e21dba51d9968a1073d43143b7acbd4179a8fa73fc5f48921eabac7ea9869daa
-
SHA512
9e1b1142248c8088c2ecb2bd33887136e4f39c3590ce3b95f2fa5e93b922a07c7ecd598650d91a7ee93c4f018b898a96e49ed41157be607abf1b1ce9845c72c1
Score10/10-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-