General

  • Target

    5b6862658f6a11588c12e3fafe7d505cb123121a9c1ffc0b38352b9d823f71b6

  • Size

    17KB

  • Sample

    220801-3yz5tsacc8

  • MD5

    4379e00fd1c533fcb45e8abe940f5de7

  • SHA1

    02133700dea97452649e0bd1a6ff30096a3c095b

  • SHA256

    5b6862658f6a11588c12e3fafe7d505cb123121a9c1ffc0b38352b9d823f71b6

  • SHA512

    e1f549f653142657cd753a605bdaa53b22c31c6bc2f4e1b179ec31a716a9a31947d5ac466985577b7c20ceab9c741ae8baad2e91877a580b1386bf00fd9dcffd

Score
8/10

Malware Config

Targets

    • Target

      FILE_2-TW-2019-Y4249.js

    • Size

      95KB

    • MD5

      8c68270dfbcd3b907b6a29c9cd484499

    • SHA1

      971dfafcea7a8b1b26174d429984d2c0a91c1163

    • SHA256

      1e16035f416b56b7d0cdefc0fa398428a625786ff2cbf818c002b0d01cb1ec83

    • SHA512

      8577b063bbd9e3793475e55c2749bf16fcbc147ec35cc5744b3b866df176f15269454121f7ebf87ca387245f47792226e9d44bc081bb3d54ee51a53390f88d70

    Score
    8/10
    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Tasks