Resubmissions
13/12/2024, 13:42
241213-qzv62szngy 1012/12/2024, 18:20
241212-wytvgssnay 812/12/2024, 17:47
241212-wcwrys1qg1 712/12/2024, 17:04
241212-vldr3aspck 812/12/2024, 16:25
241212-txbw6szkhx 811/12/2024, 19:44
241211-yfvp6swkhv 809/12/2024, 19:12
241209-xwm5laxpbt 809/12/2024, 17:25
241209-vzfhtavngv 309/12/2024, 13:30
241209-qsbh3atnfp 308/12/2024, 20:49
241208-zl1n2stqas 8General
-
Target
https://158.69.36.15/files/estrouvinhar.js
-
Sample
241212-wytvgssnay
Score
8/10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://158.69.36.15/files/estrouvinhar.js
Resource
win11-20241007-en
25 signatures
1800 seconds
Malware Config
Targets
-
-
Target
https://158.69.36.15/files/estrouvinhar.js
Score8/10-
Downloads MZ/PE file
-
A potential corporate email address has been identified in the URL: [email protected]
-
Executes dropped EXE
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-