General

  • Target

    40a38d20a40a0a2e7d509d95e1b72c34b8c9f45aac83f33420bb70728b4cc345

  • Size

    6KB

  • Sample

    220708-syylwsada2

  • MD5

    cb96dcaac8f9d094493ffcaabedca477

  • SHA1

    8d05af60e9fbff94de3140efc9f85bdab05b9118

  • SHA256

    40a38d20a40a0a2e7d509d95e1b72c34b8c9f45aac83f33420bb70728b4cc345

  • SHA512

    1d404f5f1ba07925b4089a43e4e3da517ca10577a8011ccbe58290d54c2db4a02ff4509d37e550a59885d5d18f62914e4c29fe48147044fde908fc8fe4d9f40d

Score
8/10

Malware Config

Targets

    • Target

      LX_13602483_04242019.js

    • Size

      26KB

    • MD5

      dc325decfb873739d6c09055b09fc043

    • SHA1

      50dfe46b30f8dee35bc6f1285138e3dd631165ee

    • SHA256

      f9a3d8d2568059bff0da6d27fe8d474fa8dc1c0f97c24433f2fd9caed3594b0f

    • SHA512

      3a468cb4ad8ebc69cd53891868949856bd5877b72191bcc500b097bd2e090ee326ca8ef82b6f0d69f9296ab79091c57788d09f905f9b8eefd87a34af3aad341f

    Score
    8/10
    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Tasks