General

  • Target

    Offer_to_purchase_and_contract_form_2g (laj).js

  • Size

    483KB

  • Sample

    220911-qdpr5sbfa4

  • MD5

    1ecac36d6a286e090ecd1586be6e883c

  • SHA1

    70b8ff30083417785c4ecdd38410afdb80d55dc9

  • SHA256

    a5760c44000a01657ff773182f5403ec576b075859e4447048435f273cc1ead1

  • SHA512

    0f58ecd5010884d7ec7d9e0569c8732f7ff53ab67fbdd52efc99861d161068dafd80b7ff507252d4192ee5cd18c0d3f83e912caae254f0f1ae40a44f00e7e51f

  • SSDEEP

    6144:cQH2aTulaxl4qhEfDpVT7Wiagmd4iLAmWH6FSF:fNhEfDpV+iagmd4iLAmWH6C

Score
10/10

Malware Config

Targets

    • Target

      Offer_to_purchase_and_contract_form_2g (laj).js

    • Size

      483KB

    • MD5

      1ecac36d6a286e090ecd1586be6e883c

    • SHA1

      70b8ff30083417785c4ecdd38410afdb80d55dc9

    • SHA256

      a5760c44000a01657ff773182f5403ec576b075859e4447048435f273cc1ead1

    • SHA512

      0f58ecd5010884d7ec7d9e0569c8732f7ff53ab67fbdd52efc99861d161068dafd80b7ff507252d4192ee5cd18c0d3f83e912caae254f0f1ae40a44f00e7e51f

    • SSDEEP

      6144:cQH2aTulaxl4qhEfDpVT7Wiagmd4iLAmWH6FSF:fNhEfDpV+iagmd4iLAmWH6C

    Score
    10/10
    • GootLoader

      JavaScript loader known for delivering other families such as Gootkit and Cobaltstrike.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks