General
-
Target
SOA and invoices.js
-
Size
4.4MB
-
Sample
230208-xbvnyade9x
-
MD5
08ec6390255e658106aac7aae7114b6c
-
SHA1
b8f85e4daf4461f6ee5c69ff95bc51c24b33fff0
-
SHA256
64394d6cb0b1ac69cddc943ae96e755184d20a60428372e24e0df466c2debfa9
-
SHA512
b1834040f984b200b3686cb97d846ecc894bd1af3fd06bc21de00cd0613d3ad9b85f780b6b5b5a4d1345ade5a1acdb36b13f55e803b654eb576e980cce534152
-
SSDEEP
24576:rDg0p0xod7eN0L23S6z4/WBXVFbPUzgvQ/vZSoKJ6hU:18N0IZTBnbPe1KJ6hU
Static task
static1
Behavioral task
behavioral1
Sample
SOA and invoices.js
Resource
win7-20221111-en
Malware Config
Targets
-
-
Target
SOA and invoices.js
-
Size
4.4MB
-
MD5
08ec6390255e658106aac7aae7114b6c
-
SHA1
b8f85e4daf4461f6ee5c69ff95bc51c24b33fff0
-
SHA256
64394d6cb0b1ac69cddc943ae96e755184d20a60428372e24e0df466c2debfa9
-
SHA512
b1834040f984b200b3686cb97d846ecc894bd1af3fd06bc21de00cd0613d3ad9b85f780b6b5b5a4d1345ade5a1acdb36b13f55e803b654eb576e980cce534152
-
SSDEEP
24576:rDg0p0xod7eN0L23S6z4/WBXVFbPUzgvQ/vZSoKJ6hU:18N0IZTBnbPe1KJ6hU
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-