General
-
Target
lqxlQsUjTm_ee dropper 2.js
-
Size
27KB
-
Sample
210906-pp216sbaf9
-
MD5
3bd9840766e032536ab43c4f67b61a68
-
SHA1
10fcf2f0180c44c9b1fdd966b7e35658fce7fc11
-
SHA256
42f9f906a9e934e2680f95dd68204fef725c9827148bef6549581a542804062d
-
SHA512
1cd2b4a23ae9288f6ea758636bb80f65a8b37656754997f7b28c13c13dd60fde9e457d8c94c931ad4c9017bde8cbaa9142c2c2f287e76678f807386e7ee0056d
Static task
static1
Behavioral task
behavioral1
Sample
lqxlQsUjTm_ee dropper 2.js
Resource
win7-en
Behavioral task
behavioral2
Sample
lqxlQsUjTm_ee dropper 2.js
Resource
win10v20210408
Malware Config
Targets
-
-
Target
lqxlQsUjTm_ee dropper 2.js
-
Size
27KB
-
MD5
3bd9840766e032536ab43c4f67b61a68
-
SHA1
10fcf2f0180c44c9b1fdd966b7e35658fce7fc11
-
SHA256
42f9f906a9e934e2680f95dd68204fef725c9827148bef6549581a542804062d
-
SHA512
1cd2b4a23ae9288f6ea758636bb80f65a8b37656754997f7b28c13c13dd60fde9e457d8c94c931ad4c9017bde8cbaa9142c2c2f287e76678f807386e7ee0056d
Score10/10-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-