General
-
Target
$RDOOKRE.js.zip
-
Size
7KB
-
Sample
241127-raadqawmcy
-
MD5
b2ff1db12f44008428a6492eec813015
-
SHA1
fffa2a667e815782979ce4a2a47876899f9e3f71
-
SHA256
2ec477f607bff57fab8762f99c4c316d467d384d3a6d3ec12286e330b1a49696
-
SHA512
ba109e60842ee5b6d538ff31191455f234cfff78f644b6012f0c026b28e7a9da3cd9fa9730eb7a1759e2ae20c3cb9847d6256802ddaa31ea3aad3c3f8c1f76d4
-
SSDEEP
96:AkNHCeBaX8+ETiDirKWhbebO0RXDxpc0YqRgZc/kOSKijeTl55jv9xFHqg/xB8vK:AtMkirKbHVC0VD/kn9ju7PFHqYQ0Mm
Static task
static1
Behavioral task
behavioral1
Sample
$RDOOKRE.js
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
$RDOOKRE.js
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://drive.google.com/uc?export=download&id=
Targets
-
-
Target
$RDOOKRE.js
-
Size
199KB
-
MD5
0dc3ee0972ecfb9e62b68dccc42a73bf
-
SHA1
7f882e78a7909c006b34e4a8fd916bf8ef839a64
-
SHA256
4e0681a5ca00bde3ae2ab6d71b6f9d22aa579274768ae594848e7a6aa279fce6
-
SHA512
dcaf3a3ab69c4c8e9d39e65b514e4cc70a289af94c21a3e673f5a68ca6e3559218ca91f528f3023a2c243b3093d6f504e741b0c4ac72c99fbed4bc0c844e8831
-
SSDEEP
3072:AW1tKbWXt+NWXt+NWXt+NWXt+NWXt+NWXt+YWXt+NWXt+NWXt+NWXt+NWXt+NWXC:p
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Legitimate hosting services abused for malware hosting/C2
-