General
-
Target
T00BUX.js
-
Size
6KB
-
Sample
210915-s4rqjadhhn
-
MD5
d1e6f13e10903ba40e0dd32738370cca
-
SHA1
c11487a213be0ed1414756ae47fcc3f2ce3cf060
-
SHA256
d1b5edc86c7876182163193ddb1e46955a0a8486e2cde57a51456a42a04f6314
-
SHA512
bed44bd5b2423914d886835261590057effbbc83fda96711190f87867af4e5271b6d6b69cf76c9a8ecd8285df4b142600960fb0dff67bcc0771b9084aa421c45
Static task
static1
Behavioral task
behavioral1
Sample
T00BUX.js
Resource
win7-en
Behavioral task
behavioral2
Sample
T00BUX.js
Resource
win10-en
Malware Config
Targets
-
-
Target
T00BUX.js
-
Size
6KB
-
MD5
d1e6f13e10903ba40e0dd32738370cca
-
SHA1
c11487a213be0ed1414756ae47fcc3f2ce3cf060
-
SHA256
d1b5edc86c7876182163193ddb1e46955a0a8486e2cde57a51456a42a04f6314
-
SHA512
bed44bd5b2423914d886835261590057effbbc83fda96711190f87867af4e5271b6d6b69cf76c9a8ecd8285df4b142600960fb0dff67bcc0771b9084aa421c45
Score10/10-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-