General
-
Target
jelly.kfx
-
Size
34KB
-
Sample
230306-xrbwrsea51
-
MD5
73a740cbbc8d0a615c0e8f38ee74c455
-
SHA1
938071766322f9e9e0aeb1707752ae75f02225b3
-
SHA256
fed431049eed58d60626730cc197450ef9336235bda592282e330318af86a014
-
SHA512
d6afeef612aaecf19dbe6ef2e8ec0dceae390d4cf979e2c8cabb81f65678e56c8fe0249fba18beb3a9187df95b175744e13b9146a4bcebc073b10b104b93183e
-
SSDEEP
768:mj2ecWPG+8k+jLgRmbf0/w1UbvJ2o7ZTAWgg9ulwc0:mj2ecW1+jAEfcwUbvJ5H9uyF
Static task
static1
Behavioral task
behavioral1
Sample
jelly.vbs
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
jelly.vbs
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
jelly.kfx
-
Size
34KB
-
MD5
73a740cbbc8d0a615c0e8f38ee74c455
-
SHA1
938071766322f9e9e0aeb1707752ae75f02225b3
-
SHA256
fed431049eed58d60626730cc197450ef9336235bda592282e330318af86a014
-
SHA512
d6afeef612aaecf19dbe6ef2e8ec0dceae390d4cf979e2c8cabb81f65678e56c8fe0249fba18beb3a9187df95b175744e13b9146a4bcebc073b10b104b93183e
-
SSDEEP
768:mj2ecWPG+8k+jLgRmbf0/w1UbvJ2o7ZTAWgg9ulwc0:mj2ecW1+jAEfcwUbvJ5H9uyF
Score8/10-
Blocklisted process makes network request
-
Drops file in System32 directory
-