General
-
Target
e867fceff6c94157508b6b4f779e5d1ba1e624b10b176f4ca4a9d3db8daa1608.jar
-
Size
400KB
-
Sample
240807-ctjn6syckj
-
MD5
4516f3c8f31a3df10b9c5c0295f22d14
-
SHA1
5d58d6cee6a3c84438f379ed618a9d76ba75cfa0
-
SHA256
e867fceff6c94157508b6b4f779e5d1ba1e624b10b176f4ca4a9d3db8daa1608
-
SHA512
e2ed607da7c07bbbc6dea89f44ef3d79e2919b7a9fab5cad38a3c051c4ddcab14e1b8f9510569bfc8783baf4bc79764217566b6252dee83638f9aeb40f93d181
-
SSDEEP
12288:2rRKHTm5srLXDZsfv7f35f6zc/BP9iNeD:2duTm5CiTpzP9QC
Static task
static1
Behavioral task
behavioral1
Sample
e867fceff6c94157508b6b4f779e5d1ba1e624b10b176f4ca4a9d3db8daa1608.jar
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
e867fceff6c94157508b6b4f779e5d1ba1e624b10b176f4ca4a9d3db8daa1608.jar
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
e867fceff6c94157508b6b4f779e5d1ba1e624b10b176f4ca4a9d3db8daa1608.jar
-
Size
400KB
-
MD5
4516f3c8f31a3df10b9c5c0295f22d14
-
SHA1
5d58d6cee6a3c84438f379ed618a9d76ba75cfa0
-
SHA256
e867fceff6c94157508b6b4f779e5d1ba1e624b10b176f4ca4a9d3db8daa1608
-
SHA512
e2ed607da7c07bbbc6dea89f44ef3d79e2919b7a9fab5cad38a3c051c4ddcab14e1b8f9510569bfc8783baf4bc79764217566b6252dee83638f9aeb40f93d181
-
SSDEEP
12288:2rRKHTm5srLXDZsfv7f35f6zc/BP9iNeD:2duTm5CiTpzP9QC
Score10/10-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1