General
-
Target
Document-v05-53-20.js
-
Size
313KB
-
Sample
241113-j47x3sxmft
-
MD5
6cd9c64a0529b03d105ed83dc7ac9a37
-
SHA1
7fb5cf0c74dfe53a87dd66a96699a245b69bff62
-
SHA256
3f948bcd8c16b6e2c20fec3e9126a730b835888a4f071391c7847b00a27d8dd8
-
SHA512
c781028fd7f74f455189646e796f85975409ddc94165e6e175500e82fe8a54f5a04c52097df54bcf813632aa4c16be93fb8eb4ec2f8c56a2a592e28110676189
-
SSDEEP
6144:23L5OgSHWLjOBeJz2FQhpqan7tJmWeCLj/yZSmK/my4HoYQ1vU8VoEOrG:sZF2Iqis2/5p4HQfoC
Static task
static1
Malware Config
Targets
-
-
Target
Document-v05-53-20.js
-
Size
313KB
-
MD5
6cd9c64a0529b03d105ed83dc7ac9a37
-
SHA1
7fb5cf0c74dfe53a87dd66a96699a245b69bff62
-
SHA256
3f948bcd8c16b6e2c20fec3e9126a730b835888a4f071391c7847b00a27d8dd8
-
SHA512
c781028fd7f74f455189646e796f85975409ddc94165e6e175500e82fe8a54f5a04c52097df54bcf813632aa4c16be93fb8eb4ec2f8c56a2a592e28110676189
-
SSDEEP
6144:23L5OgSHWLjOBeJz2FQhpqan7tJmWeCLj/yZSmK/my4HoYQ1vU8VoEOrG:sZF2Iqis2/5p4HQfoC
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-