Behavioral task
behavioral1
Sample
c-users-vince-appdata-roaming-microsoft-windows-start-menu-programs-startup-jre-8u231-windows-x64-jar.jar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c-users-vince-appdata-roaming-microsoft-windows-start-menu-programs-startup-jre-8u231-windows-x64-jar.jar
Resource
win10v2004-20241007-en
General
-
Target
c-users-vince-appdata-roaming-microsoft-windows-start-menu-programs-startup-jre-8u231-windows-x64-jar.zip
-
Size
21.8MB
-
MD5
e033b8bb42f73a071dbb80a58fedef53
-
SHA1
dc2ee81a5c897c6512fbd9a06a804ba363ec7a58
-
SHA256
7e8d5730213643eaba3ac42ab8eedba04d382d7a030c19a1f27d383514519f51
-
SHA512
a34e98f1cb01a6cad0283bfb1d6288080ca7a3bb0c523c5a750794091b8ad4c76a9a566e53203e93938647acf8dbc71b1cf87a7a48efa9d203cd3fc882712764
-
SSDEEP
393216:FpzW9jkw+fM/C/yqur02Rok0m45996hJWrt0vYetWgwSBPuIPo/oqSBpp4x8TkpW:FpzKkBfM/C/yqujRotm459967WBhetDX
Malware Config
Signatures
-
Dynamic RAT payload 2 IoCs
resource yara_rule static1/unpack001/c-users-vince-appdata-roaming-microsoft-windows-start-menu-programs-startup-jre-8u231-windows-x64-jar family_dynamicrat sample family_dynamicrat -
Dynamicrat family
Files
-
c-users-vince-appdata-roaming-microsoft-windows-start-menu-programs-startup-jre-8u231-windows-x64-jar.zip.zip
Password: infected
-
c-users-vince-appdata-roaming-microsoft-windows-start-menu-programs-startup-jre-8u231-windows-x64-jar.jar