Static task
static1
Behavioral task
behavioral1
Sample
4d96609c79409d956dca3fd90b0e5875bbf4d8ed878c3fc05e3f4e1fc6428c55.js
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
4d96609c79409d956dca3fd90b0e5875bbf4d8ed878c3fc05e3f4e1fc6428c55.js
Resource
win10v2004-20220414-en
General
-
Target
4d96609c79409d956dca3fd90b0e5875bbf4d8ed878c3fc05e3f4e1fc6428c55.bin
-
Size
379KB
-
MD5
a63817703de8f1c52e0620daa6029df2
-
SHA1
4f0354cddf9bc591bd918744bf2b513a9ffea689
-
SHA256
4d96609c79409d956dca3fd90b0e5875bbf4d8ed878c3fc05e3f4e1fc6428c55
-
SHA512
e2db856d7552c89c8340b2a19ae0df055b846f7418a2eb11ddd8150edaf2ca9560d95d16d27fa27cd4be77dc76f65fd0ab8a4180097deec1746a6661edd1617e
-
SSDEEP
3072:GAPcGgwq/tjjpYzDwf/NI5AwOCinDoRzD0SfOmtIpxwW7203Wkt42d4p722:BLqGDMsAZdK0Oa9ho722
Malware Config
Extracted
joker
https://flashdownloadserver.oss-cn-hongkong.aliyuncs.com
Signatures
-
AgentTesla payload 1 IoCs
resource yara_rule sample family_agenttesla -
Agenttesla family
-
DarkTrack payload 1 IoCs
resource yara_rule sample family_darktrack -
Darkcomet family
-
Darktrack family
-
Detect LockFile payload 1 IoCs
resource yara_rule sample family_lockbit -
Detected Mount Locker ransomware 1 IoCs
resource yara_rule sample RANSOM_mountlocker -
Joker family
-
Lockfile family
-
resource yara_rule sample m00nd3v_logger -
M00nd3v_logger family
-
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
resource yara_rule sample masslogger_log_file -
Masslogger family
-
Matiex Main payload 1 IoCs
resource yara_rule sample family_matiex -
Matiex family
-
Mountlocker family
-
Shurk Stealer payload 1 IoCs
resource yara_rule sample shurk_stealer -
Shurk family
-
StormKitty payload 1 IoCs
resource yara_rule sample family_stormkitty -
Stormkitty family
Files
-
4d96609c79409d956dca3fd90b0e5875bbf4d8ed878c3fc05e3f4e1fc6428c55.bin.js