General
-
Target
YUEOPInvoiceCopy.js
-
Size
12KB
-
Sample
211005-r376fsaaa4
-
MD5
13cbbf285a8353dea38b24e1e1472c29
-
SHA1
d5f98537c95a00a6fbb9db349a1567fc2ac74cb9
-
SHA256
6ecf7599637e51186edb088b0b39b592676a6c61c5917ee5c58a64b2ffed0be7
-
SHA512
41ccc979a7dc9f9bd444ec3c66b5979f9b02945238d5670f1c6bac4fac1a11153327ed025e5c7046cfd72ec5b0466d0a806bf9eeb20b7966102babea1774e621
Static task
static1
Behavioral task
behavioral1
Sample
YUEOPInvoiceCopy.js
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
YUEOPInvoiceCopy.js
Resource
win10v20210408
Malware Config
Targets
-
-
Target
YUEOPInvoiceCopy.js
-
Size
12KB
-
MD5
13cbbf285a8353dea38b24e1e1472c29
-
SHA1
d5f98537c95a00a6fbb9db349a1567fc2ac74cb9
-
SHA256
6ecf7599637e51186edb088b0b39b592676a6c61c5917ee5c58a64b2ffed0be7
-
SHA512
41ccc979a7dc9f9bd444ec3c66b5979f9b02945238d5670f1c6bac4fac1a11153327ed025e5c7046cfd72ec5b0466d0a806bf9eeb20b7966102babea1774e621
Score10/10-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-