General
-
Target
js-decoded-1.js
-
Size
346KB
-
Sample
211208-tkyv6sgcc8
-
MD5
241d3041e2bb264cf886eff9fc3de24e
-
SHA1
7f3fe68b0ef727fca62441cff8eea28c5cd51941
-
SHA256
e817bd6a89f5bc3ee448e3c39e5c4739cf010bb815d087ecdd1b5e1f30c04959
-
SHA512
078b8f61b2afeefdf283d6e8f6b33986fc3500788b8d77e7672fc6aae70221ac140d850f91401a3e65a8996f49b4c9babdabac7071d7ea40adc84c62e9bbddc0
Static task
static1
Behavioral task
behavioral1
Sample
js-decoded-1.js
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
js-decoded-1.js
Resource
win10-en-20211208
Malware Config
Targets
-
-
Target
js-decoded-1.js
-
Size
346KB
-
MD5
241d3041e2bb264cf886eff9fc3de24e
-
SHA1
7f3fe68b0ef727fca62441cff8eea28c5cd51941
-
SHA256
e817bd6a89f5bc3ee448e3c39e5c4739cf010bb815d087ecdd1b5e1f30c04959
-
SHA512
078b8f61b2afeefdf283d6e8f6b33986fc3500788b8d77e7672fc6aae70221ac140d850f91401a3e65a8996f49b4c9babdabac7071d7ea40adc84c62e9bbddc0
-
Blocklisted process makes network request
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-