General
-
Target
E00VS_Payment_Copy.js
-
Size
12KB
-
Sample
210914-yxz18agcb5
-
MD5
d3f3203a0eae82b2e715f253de902238
-
SHA1
04222a59b1033486041ee1b1866b1b84371d69c8
-
SHA256
a6074fe81acba4af7ff9a864fc65da056ae657f051330ebd1633d81b702c40cd
-
SHA512
ca14c9b9232d0fcefa84ed2b7b4ef6b7eb7e625f2548f1be1304346a1a7f44c0e747b78378bbc5882913322321d783e4ffcbe25b3ed6c11533e69b4a93b6bda8
Static task
static1
Behavioral task
behavioral1
Sample
E00VS_Payment_Copy.js
Resource
win7v20210408
Behavioral task
behavioral2
Sample
E00VS_Payment_Copy.js
Resource
win10-en
Malware Config
Targets
-
-
Target
E00VS_Payment_Copy.js
-
Size
12KB
-
MD5
d3f3203a0eae82b2e715f253de902238
-
SHA1
04222a59b1033486041ee1b1866b1b84371d69c8
-
SHA256
a6074fe81acba4af7ff9a864fc65da056ae657f051330ebd1633d81b702c40cd
-
SHA512
ca14c9b9232d0fcefa84ed2b7b4ef6b7eb7e625f2548f1be1304346a1a7f44c0e747b78378bbc5882913322321d783e4ffcbe25b3ed6c11533e69b4a93b6bda8
Score10/10-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-