Static task
static1
Behavioral task
behavioral1
Sample
240325-bhncjseg5x.js
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
240325-bhncjseg5x.js
Resource
win10v2004-20240226-en
General
-
Target
240325-bhncjseg5x
-
Size
486KB
-
MD5
a585fc57f4ea8fc2a275447401a05246
-
SHA1
338d9e0241a54ea2c32f44378684881083ca7661
-
SHA256
623a5ea08484838a6b750977967f8b8808efda37831e33cea789f6a38a56e70f
-
SHA512
6deabcd6fa3be524a4cd570755f97b888ab55cbbe8e8bc7d1773d2406a527a2e21b97446f2aeeadf68e524af26338f2c431659321ca5d5d46f39f953a1e741f1
-
SSDEEP
3072:dVnNs48OW0kT97kFUxj3mKMABR3R7DyWvEXNemiS0KPMID5whT0bMNj69wrVRs3B:/bkw83zLJtMtwmIj6ERCcXhwB
Malware Config
Signatures
-
AgentTesla payload 1 IoCs
Processes:
resource yara_rule sample family_agenttesla -
Agenttesla family
-
DarkTrack payload 1 IoCs
Processes:
resource yara_rule sample family_darktrack -
Darkcomet family
-
Darktrack family
-
Detect LockFile payload 1 IoCs
Processes:
resource yara_rule sample family_lockfile -
Detected Mount Locker ransomware 1 IoCs
Processes:
resource yara_rule sample RANSOM_mountlocker -
Detects Surtr Payload 1 IoCs
Processes:
resource yara_rule sample family_surtr -
Detects Zeppelin payload 1 IoCs
Processes:
resource yara_rule sample family_zeppelin -
Detects command variations typically used by ransomware 1 IoCs
Processes:
resource yara_rule sample INDICATOR_SUSPICIOUS_GENRansomware -
Detects executables referencing credit card regular expressions 1 IoCs
Processes:
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_CC_Regex -
Lockfile family
-
Processes:
resource yara_rule sample m00nd3v_logger -
M00nd3v_logger family
-
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
Processes:
resource yara_rule sample masslogger_log_file -
Masslogger family
-
Matiex Main payload 1 IoCs
Processes:
resource yara_rule sample family_matiex -
Matiex family
-
ModiLoader Second Stage 1 IoCs
Processes:
resource yara_rule sample modiloader_stage2 -
Modiloader family
-
Mountlocker family
-
Shurk Stealer payload 1 IoCs
Processes:
resource yara_rule sample shurk_stealer -
Shurk family
-
StormKitty payload 1 IoCs
Processes:
resource yara_rule sample family_stormkitty -
Stormkitty family
-
Surtr family
-
Vulturi family
-
Vulturi payload 1 IoCs
Processes:
resource yara_rule sample family_vulturi -
XMRig Miner payload 1 IoCs
Processes:
resource yara_rule sample family_xmrig -
Xmrig family
-
Zeppelin family
Files
-
240325-bhncjseg5x.js