General
-
Target
f4a519cdca700c3e6edb471a4a0e52f42b16fa1dbeed756beafc481b4b867c60
-
Size
34KB
-
Sample
220206-y2qncabgc7
-
MD5
554d30067b0edea56a24baab1279d9ad
-
SHA1
9a6ea91e49c1622576fe8a2465414f1c9c4ac712
-
SHA256
f4a519cdca700c3e6edb471a4a0e52f42b16fa1dbeed756beafc481b4b867c60
-
SHA512
dfeb820ca2d311c91a7caa095eee586ed1911427917a9c25b17519205768bf1e225735a86418f79ad56f7a771285f1a38c8f1185606287dc8c5e7ec7633bb9b8
Static task
static1
Behavioral task
behavioral1
Sample
TransferReceipt.js
Resource
win7-en-20211208
Malware Config
Targets
-
-
Target
TransferReceipt.js
-
Size
32KB
-
MD5
13b19bb0f4c15c58b6d01103bbde3411
-
SHA1
a9824d4a4c04cdd594bf17f0c2cf8d39a2f31321
-
SHA256
07d6e04c6c7905d9a1281d14f8e5b2ce33b6eaae92db4e07b9e1cdc4dff750fb
-
SHA512
59d0e7a935429fc9ea55574a2d96784148de86e56d0b60b0b9b063e834b5550f0f3bc37701c2513dd289fc101fe444d40550a5b608384ce41a60252efa9dbd82
-
Blocklisted process makes network request
-
Drops startup file
-