Static task
static1
Behavioral task
behavioral1
Sample
0ebc25a1143481ae63dbb43869a289286c2a2b6d19ed2e41dc3128353046f10c.js
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
0ebc25a1143481ae63dbb43869a289286c2a2b6d19ed2e41dc3128353046f10c.js
Resource
win10v2004-20220414-en
General
-
Target
0ebc25a1143481ae63dbb43869a289286c2a2b6d19ed2e41dc3128353046f10c.bin
-
Size
388KB
-
MD5
5290830c64b5de363ef5a93d4820e4e6
-
SHA1
fb5fadc51f54cb04a5d6b8fb5fac86000f366cd4
-
SHA256
0ebc25a1143481ae63dbb43869a289286c2a2b6d19ed2e41dc3128353046f10c
-
SHA512
2d746ffe767a7507662a45fff8198c948903099932dda6167b42c1d71f9f6256ae6db9b4aa83126511145636ec58f22342f41cb36a8c4eb390673115c54432e6
-
SSDEEP
3072:MtJHg/rntoaLx8RvZ1jO7iTqEoDOYW2HfLcGAoaKTkmq5MjA3tV3oObOO/UV:bTng/aimtKYBT0NRnFB/UV
Malware Config
Extracted
joker
https://flashdownloadserver.oss-cn-hongkong.aliyuncs.com
Signatures
-
AgentTesla payload 1 IoCs
resource yara_rule sample family_agenttesla -
Agenttesla family
-
DarkTrack payload 1 IoCs
resource yara_rule sample family_darktrack -
Darkcomet family
-
Darktrack family
-
Detect LockFile payload 1 IoCs
resource yara_rule sample family_lockbit -
Detected Mount Locker ransomware 1 IoCs
resource yara_rule sample RANSOM_mountlocker -
Joker family
-
Lockfile family
-
resource yara_rule sample m00nd3v_logger -
M00nd3v_logger family
-
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
resource yara_rule sample masslogger_log_file -
Masslogger family
-
Matiex Main payload 1 IoCs
resource yara_rule sample family_matiex -
Matiex family
-
Mountlocker family
-
Shurk Stealer payload 1 IoCs
resource yara_rule sample shurk_stealer -
Shurk family
-
StormKitty payload 1 IoCs
resource yara_rule sample family_stormkitty -
Stormkitty family
Files
-
0ebc25a1143481ae63dbb43869a289286c2a2b6d19ed2e41dc3128353046f10c.bin.js