Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17-02-2025 20:39

General

  • Target

    malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/026b02380e79af4b1b0282c2473828c6fb9.js

  • Size

    19KB

  • MD5

    6dcd01653c561fb0d8a701de362cd37e

  • SHA1

    8b9ee66a192dcbb17cd9cb2173da38759aae8ce8

  • SHA256

    026b02380e79af4b1b0282c2473828c6fb9c76a421bba09ff2019415c6c6976a

  • SHA512

    9b6bd49df73551ab6c5af364eb7ff120cfc3e3f012fff9ce03404d9cc72b59c61e2d561f742f39607429d9581b152d4d04ee2d513f6f6e050e6d2c6e2aa2868f

  • SSDEEP

    384:w4yTz0OTr7de38Tnz2kIEZUW+/GKPRs0XWhkVErkYH0+8w:wBTz0O/h/rz2kISUW+eqCgWhkVEW/w

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\malware-samples-master\2018-04-GandCrab-Swarm\dropper-javascript\026b02380e79af4b1b0282c2473828c6fb9.js
    1⤵
    • Blocklisted process makes network request
    PID:2848

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads