Summary | ZeroBOX

Edge.js

Category Machine Started Completed
FILE s1_win7_x6402 July 29, 2021, 9:44 a.m. July 29, 2021, 9:46 a.m.
Size 2.5KB
Type ASCII text, with CRLF line terminators
MD5 8a005a721fcf3972456cb12e0a4f3fa0
SHA256 f1df2c9befe5e84082891195415c8b032fbf3859090e1e3a856fb9611f85bb5c
CRC32 A176D23F
ssdeep 48:mup04JDUsJBeNWczSxWDE1YWbJVLNSJ3WQFSVV9vuByx33udwi6Df8zv5XYH:g41jeNRzUNK3WQFMV9mBA33udwi6Ovd6
Yara None matched

Name Response Post-Analysis Lookup
fe1eaf89.office.drpease.com 195.189.96.41
IP Address Status Action
164.124.101.2 Active Moloch
195.189.96.41 Active Moloch

Symantec ISB.Downloader!gen406
Avast SNH:Script [Dropper]
Kaspersky HEUR:Trojan-Downloader.Script.SLoad.gen
AVG SNH:Script [Dropper]
Time & API Arguments Status Return Repeated

InternetCrackUrlW

url: https://fe1eaf89.office.drpease.com/pixel.png
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 81788928
http_method: POST
referer:
path: /pixel.png
1 13369356 0
Time & API Arguments Status Return Repeated

InternetCrackUrlW

url: https://fe1eaf89.office.drpease.com/pixel.png
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 81788928
http_method: POST
referer:
path: /pixel.png
1 13369356 0

send

buffer: !
socket: 840
sent: 1
1 1 0

send

buffer: ~zaùé¢åE €“Ô’CÉn+ê'‹­NDªSŠs6»/5 ÀÀÀ À 289ÿ fe1eaf89.office.drpease.com  
socket: 976
sent: 131
1 131 0

send

buffer: !
socket: 840
sent: 1
1 1 0

send

buffer: !
socket: 840
sent: 1
1 1 0

send

buffer: ~zaùêÙJ ÔãØÍ×u$Æ ·2ÐÀHˆRÕIá >/5 ÀÀÀ À 289ÿ fe1eaf89.office.drpease.com  
socket: 976
sent: 131
1 131 0

send

buffer: !
socket: 840
sent: 1
1 1 0

send

buffer: !
socket: 840
sent: 1
1 1 0

send

buffer: 51aùê|ǖ'aû[xÂ]d::R„àq˜hû&‚¸ðM  ÿ
socket: 976
sent: 58
1 58 0

send

buffer: !
socket: 840
sent: 1
1 1 0

send

buffer: !
socket: 840
sent: 1
1 1 0