General
-
Target
java.js
-
Size
504KB
-
Sample
240207-jad3xafffk
-
MD5
f9a2f407e3a96b98798ead405013535c
-
SHA1
085a55fc5e128fe2e18aa4d17c4762bf86b051a2
-
SHA256
c76700dd7e3de8aabaa19309caa7a1b83f3a175778d1b374315cdb362d4f7b50
-
SHA512
f3c9d87e502a94492968ba5ca1f427f63e10ce137da773d5dc53376c9fcf907cbb4895c9150768a18a86fb6fb7a45e753c331e86ca24b94758a057f9758be332
-
SSDEEP
3072:U2I4IZk8bw+bDtRVP2QmYNWXo9phTMQ6EHqTNehzVqtSdbL6x7h2H+kzV4mWeOD0:U2I4IZkUVP2tYNWXoX/6qqTNeP
Static task
static1
Behavioral task
behavioral1
Sample
java.js
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
java.js
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
java.js
-
Size
504KB
-
MD5
f9a2f407e3a96b98798ead405013535c
-
SHA1
085a55fc5e128fe2e18aa4d17c4762bf86b051a2
-
SHA256
c76700dd7e3de8aabaa19309caa7a1b83f3a175778d1b374315cdb362d4f7b50
-
SHA512
f3c9d87e502a94492968ba5ca1f427f63e10ce137da773d5dc53376c9fcf907cbb4895c9150768a18a86fb6fb7a45e753c331e86ca24b94758a057f9758be332
-
SSDEEP
3072:U2I4IZk8bw+bDtRVP2QmYNWXo9phTMQ6EHqTNehzVqtSdbL6x7h2H+kzV4mWeOD0:U2I4IZkUVP2tYNWXoX/6qqTNeP
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-