General
-
Target
https://gofile.io/d/gTmuiU
-
Sample
250328-whgj8a1mx4
Score
8/10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://gofile.io/d/gTmuiU
Resource
win10ltsc2021-20250314-fr
20 signatures
300 seconds
Malware Config
Targets
-
-
Target
https://gofile.io/d/gTmuiU
Score8/10-
Downloads MZ/PE file
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-