General
-
Target
d59eb32c67feacb9d79fe315bf304d5f .js
-
Size
1.3MB
-
Sample
240506-jacvvagc55
-
MD5
d59eb32c67feacb9d79fe315bf304d5f
-
SHA1
a3bfbfa3216bd083085d47583cfc991731ee2f4b
-
SHA256
d9e9cd6107b1f2a44a9d0ff9cf16eca68680851d7f0eead5830c5f2a01b6c003
-
SHA512
44fdbb965adbc4ecd77dd5035fc7c76f822764bd41c765a41eafd6227b2515ba898a86f36aecab2d6f2222129f5123f455b74322fbbb25bab090cdd310a02085
-
SSDEEP
768:IJqH+QqJcx5TnTi9ta7SuHiHwdcU6AH6xgO:xqo5TnTi9A6H9AH83
Static task
static1
Behavioral task
behavioral1
Sample
d59eb32c67feacb9d79fe315bf304d5f .js
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d59eb32c67feacb9d79fe315bf304d5f .js
Resource
win10v2004-20240419-en
Malware Config
Targets
-
-
Target
d59eb32c67feacb9d79fe315bf304d5f .js
-
Size
1.3MB
-
MD5
d59eb32c67feacb9d79fe315bf304d5f
-
SHA1
a3bfbfa3216bd083085d47583cfc991731ee2f4b
-
SHA256
d9e9cd6107b1f2a44a9d0ff9cf16eca68680851d7f0eead5830c5f2a01b6c003
-
SHA512
44fdbb965adbc4ecd77dd5035fc7c76f822764bd41c765a41eafd6227b2515ba898a86f36aecab2d6f2222129f5123f455b74322fbbb25bab090cdd310a02085
-
SSDEEP
768:IJqH+QqJcx5TnTi9ta7SuHiHwdcU6AH6xgO:xqo5TnTi9A6H9AH83
Score8/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-