General
-
Target
JUclMnXWGX.js
-
Size
30KB
-
Sample
220620-lm7l4aecd8
-
MD5
1a78c6c4ea92442d7da8af8d2557e0d2
-
SHA1
410764bee9220b5630ac46f7a1c5c36c93b742c9
-
SHA256
288f91b613ec105cf8d9576e056b6c504c859c842b3b17649d103308040bd82d
-
SHA512
548c4cd49e8277b49d25d2d4b3ba04a29ba474e0ae1761a8edf12643923a6872e8bc448c05b0003c7bcea44cf1847d82ea7ad89874b6657e41055b89e7d4b20d
Static task
static1
Behavioral task
behavioral1
Sample
JUclMnXWGX.js
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
JUclMnXWGX.js
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
JUclMnXWGX.js
-
Size
30KB
-
MD5
1a78c6c4ea92442d7da8af8d2557e0d2
-
SHA1
410764bee9220b5630ac46f7a1c5c36c93b742c9
-
SHA256
288f91b613ec105cf8d9576e056b6c504c859c842b3b17649d103308040bd82d
-
SHA512
548c4cd49e8277b49d25d2d4b3ba04a29ba474e0ae1761a8edf12643923a6872e8bc448c05b0003c7bcea44cf1847d82ea7ad89874b6657e41055b89e7d4b20d
Score10/10-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-