General
-
Target
lnvoice.js
-
Size
1.3MB
-
Sample
240506-hkwj9sfd87
-
MD5
65f9c67965df098ac25026ce6b229861
-
SHA1
683649d54495bc1efa6dc22e3efab1c2ac3116fd
-
SHA256
acb9edc3989f14d72f7994426388cc89f9e7a2167160b5cfa971fe0b78299288
-
SHA512
bdcb1a1c24c5148b37b8a3e3ff96305d3637e8e39d9811ea507a8481c682080195d1b7e12b57e42d6572925d8164c1edfb491911dd28277bd37432961d05c0b8
-
SSDEEP
384:AhSvcDV0ZbSpIM8yvPMGjYD9s4S6SVh+GjhmSPgEH0vO6/scXeDQX45vH58jcX52:AhSvWISpEhRLXriI
Static task
static1
Behavioral task
behavioral1
Sample
lnvoice.js
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
lnvoice.js
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
lnvoice.js
-
Size
1.3MB
-
MD5
65f9c67965df098ac25026ce6b229861
-
SHA1
683649d54495bc1efa6dc22e3efab1c2ac3116fd
-
SHA256
acb9edc3989f14d72f7994426388cc89f9e7a2167160b5cfa971fe0b78299288
-
SHA512
bdcb1a1c24c5148b37b8a3e3ff96305d3637e8e39d9811ea507a8481c682080195d1b7e12b57e42d6572925d8164c1edfb491911dd28277bd37432961d05c0b8
-
SSDEEP
384:AhSvcDV0ZbSpIM8yvPMGjYD9s4S6SVh+GjhmSPgEH0vO6/scXeDQX45vH58jcX52:AhSvWISpEhRLXriI
Score8/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-