Resubmissions
13-12-2024 13:42
241213-qzv62szngy 1012-12-2024 18:20
241212-wytvgssnay 812-12-2024 17:47
241212-wcwrys1qg1 712-12-2024 17:04
241212-vldr3aspck 812-12-2024 16:25
241212-txbw6szkhx 811-12-2024 19:44
241211-yfvp6swkhv 809-12-2024 19:12
241209-xwm5laxpbt 809-12-2024 17:25
241209-vzfhtavngv 309-12-2024 13:30
241209-qsbh3atnfp 308-12-2024 20:49
241208-zl1n2stqas 8General
-
Target
https://158.69.36.15/files/estrouvinhar.js
-
Sample
241212-wytvgssnay
Score
8/10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://158.69.36.15/files/estrouvinhar.js
Resource
win11-20241007-en
windows11-21h2-x64
25 signatures
1800 seconds
Malware Config
Targets
-
-
Target
https://158.69.36.15/files/estrouvinhar.js
Score8/10-
Downloads MZ/PE file
-
A potential corporate email address has been identified in the URL: [email protected]
-
Executes dropped EXE
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-