General

  • Target

    valak_5c8ccae6678a8de39f03796e2b260cec1ab8650b15f886fed08bc85830762498

  • Size

    292KB

  • Sample

    211015-q3t36abfhp

  • MD5

    5e520c97741f4ed6098974bf4ee6c713

  • SHA1

    7667047d1e7e40d1674d8dda97a1a828ddf92111

  • SHA256

    5c8ccae6678a8de39f03796e2b260cec1ab8650b15f886fed08bc85830762498

  • SHA512

    1a7423bbbda29f1c5bf0913ce0bac9d771f9622b7552d5aa66b386534cc8f6b6c09abca19c0848ac99c2c21f611ffcf5c2a57c0c037c95d72d9d4fd24c955e00

Score
10/10

Malware Config

Targets

    • Target

      valak_5c8ccae6678a8de39f03796e2b260cec1ab8650b15f886fed08bc85830762498

    • Size

      292KB

    • MD5

      5e520c97741f4ed6098974bf4ee6c713

    • SHA1

      7667047d1e7e40d1674d8dda97a1a828ddf92111

    • SHA256

      5c8ccae6678a8de39f03796e2b260cec1ab8650b15f886fed08bc85830762498

    • SHA512

      1a7423bbbda29f1c5bf0913ce0bac9d771f9622b7552d5aa66b386534cc8f6b6c09abca19c0848ac99c2c21f611ffcf5c2a57c0c037c95d72d9d4fd24c955e00

    Score
    10/10
    • Valak

      Valak is a JavaScript loader, a link in a chain of distribution of other malware families.

    • Valak JavaScript Loader

    • suricata: ET MALWARE Win32/Valak <v9 Checkin

      suricata: ET MALWARE Win32/Valak <v9 Checkin

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks