General
-
Target
rev.zip
-
Size
59KB
-
Sample
241005-a6vwvszepa
-
MD5
0b1257ceb53b352397772b3de930d54a
-
SHA1
69018ba4f7a5dbb0584c181882bed6bcadf1bbfd
-
SHA256
d7bff41268fcf8c16cbc83ded4939a67b1fa4c4d77ae92aa44e02625071dd5d1
-
SHA512
effb6a74e63f1a1f0374578412647ad914bcc3c7f864412153d6deffa1751f8692f1fe014e244b4f5506fde9290a773a76137f2e201125df3270b66cec3b93c5
-
SSDEEP
1536:XjWFXEYEI/b+hp3wbNw7sS5hIc5NJGo8uftCZ8nDVLM3z5:Xa6YEgSh26Pl5NzrftCynJo3l
Static task
static1
Behavioral task
behavioral1
Sample
YTDLTMP/SPDL.js
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
YTDLTMP/YTDL.js
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
YTDLTMP/ytdl-deob.js
Resource
win11-20240802-en
Malware Config
Targets
-
-
Target
YTDLTMP/SPDL.js
-
Size
3KB
-
MD5
73cadb559341916d713d203af3882c7e
-
SHA1
0ec9902456e401b6bad673d7fb7f7c4d734e88dd
-
SHA256
c9e76f2dbf07170bf62673a8a08e0f8dc4ba967406ec5343964da32b72239e10
-
SHA512
ef737f38775c1136e35c9ec1ded2a77c72c129b53a550c6b12c97b932535559166f09b94ed18c47ae945d02652bed82f3a2d6577e47a3af9b76ea3ed10964301
Score6/10-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
-
-
Target
YTDLTMP/YTDL.js
-
Size
3KB
-
MD5
dbc28db0d27e69e0caa430f638418df7
-
SHA1
b02af533674ebf6cf4c2ce6406ae0196d206de08
-
SHA256
81e948814716bdb00f7beca73b60a681b3b8f34c67ecb8addddd8b86c0ffca4f
-
SHA512
04bb6fd5d9a860258586cc630ab32ecfd5893eb6dd88ebac833dc2e36b8b05cb0ea362a6fb07522bb67f60997cf3b32e446e365feb8c89f0ddadd9565605d581
Score3/10 -
-
-
Target
YTDLTMP/ytdl-deob.js
-
Size
354KB
-
MD5
adde8f3564eb6ad7883106888177c311
-
SHA1
3819ad9ac10c3361551aec28bb12324dd26449f0
-
SHA256
0d94988f866b955b40e9ece79ba403e00d00220008a1105e2441fce3f09e96ed
-
SHA512
507dc11c8a54588034b3c074f7d914451957c632d907033acb8b80f7d4390409c361e7e0683ee9ae776dc484b3e1408bfe7fc42b6e0f90d7fef2f4d7aa1748eb
-
SSDEEP
3072:LPZ4TZbEqU75dUej7OZKgiGfP8oKWrIZX6DSfWYRSLRNwY8f0Nfer7I:7KtBiL2SvMRmrU
Score3/10 -