General
-
Target
c6082fd5b700db0918ca0a11812bff24e5af3381174cc48e6b12929894fdf21d
-
Size
304KB
-
Sample
220201-k8ww2scacq
-
MD5
ab5ded95c5706413d341a337c49fa267
-
SHA1
e0989ba82063446f21a417a1f77a8f8cdfa2d639
-
SHA256
c6082fd5b700db0918ca0a11812bff24e5af3381174cc48e6b12929894fdf21d
-
SHA512
51ce52d3bd0988f3c99537e510140198c521fceb55109852a004e3f722f1121326b40d757cfef68ce30c2dddfd3acb3b65f0c5f30e9e88f584a1d414e4189b18
Static task
static1
Behavioral task
behavioral1
Sample
c6082fd5b700db0918ca0a11812bff24e5af3381174cc48e6b12929894fdf21d.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
c6082fd5b700db0918ca0a11812bff24e5af3381174cc48e6b12929894fdf21d.dll
Resource
win10v2004-en-20220112
Malware Config
Targets
-
-
Target
c6082fd5b700db0918ca0a11812bff24e5af3381174cc48e6b12929894fdf21d
-
Size
304KB
-
MD5
ab5ded95c5706413d341a337c49fa267
-
SHA1
e0989ba82063446f21a417a1f77a8f8cdfa2d639
-
SHA256
c6082fd5b700db0918ca0a11812bff24e5af3381174cc48e6b12929894fdf21d
-
SHA512
51ce52d3bd0988f3c99537e510140198c521fceb55109852a004e3f722f1121326b40d757cfef68ce30c2dddfd3acb3b65f0c5f30e9e88f584a1d414e4189b18
Score10/10-
Valak JavaScript Loader
-
Blocklisted process makes network request
-
Sets service image path in registry
-