Static task
static1
Behavioral task
behavioral1
Sample
Device/HarddiskVolume1/Users/LuciaL/AppData/Roaming/Microsoft/Windows/Start Menu/Programs/Startup/PulishFedraPlusAppV.lnk
Resource
win7-20240221-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
Device/HarddiskVolume1/Users/LuciaL/AppData/Roaming/Microsoft/Windows/Start Menu/Programs/Startup/PulishFedraPlusAppV.lnk
Resource
win10v2004-20240226-en
5 signatures
150 seconds
General
-
Target
PulishFedraPlusAppV.lnk
-
Size
1KB
-
MD5
72e8b8c27efaf2ef2234e662797f3e51
-
SHA1
7dfd60f076438790c0a8d4b78bb0b69442beea8f
-
SHA256
2fbb9b4d24a501ae2d08552a150c2b5ef8ef8c2fbd4566588c31478375aad686
-
SHA512
27566bfacd5b220f5ea8abc2e9f0302a06eb0e3104368307cd202aa42c63ea60e5fa2a77c1515936340794275a7061a97abf47f81dc83ff81e09fd747a14cdd2
Score
1/10
Malware Config
Signatures
Files
-
PulishFedraPlusAppV.lnk.zip
Password: ow&b!54X6x_#4gT@9BT4
-
Device/HarddiskVolume1/Users/LuciaL/AppData/Roaming/Microsoft/Windows/Start Menu/Programs/Startup/PulishFedraPlusAppV.lnk.lnk
-
manifest.json