General
-
Target
C0083_Invoice_Copy.js
-
Size
12KB
-
Sample
211012-tqsw4scfak
-
MD5
7db9fe7b332f94b2c50ce2761b40abfc
-
SHA1
277de0d07f6080d096fe3b2ece7c99ee3167f3ed
-
SHA256
9af04e365ed1f2e0ea04dc71729f0e3341f0f981405c9f3ddd6d6d7b693fb733
-
SHA512
b735fc8a216ba8833ebaa00d7f67969645f78a572d5c92052de36e5433d0842ed73e481aec3a58484d7a3ee36033fe83cfaa9565b70472b6b9247a4d7d640c1b
Static task
static1
Behavioral task
behavioral1
Sample
C0083_Invoice_Copy.js
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
C0083_Invoice_Copy.js
Resource
win10v20210408
Malware Config
Extracted
vjw0rm
http://mchristopherr83.duckdns.org:7922
Targets
-
-
Target
C0083_Invoice_Copy.js
-
Size
12KB
-
MD5
7db9fe7b332f94b2c50ce2761b40abfc
-
SHA1
277de0d07f6080d096fe3b2ece7c99ee3167f3ed
-
SHA256
9af04e365ed1f2e0ea04dc71729f0e3341f0f981405c9f3ddd6d6d7b693fb733
-
SHA512
b735fc8a216ba8833ebaa00d7f67969645f78a572d5c92052de36e5433d0842ed73e481aec3a58484d7a3ee36033fe83cfaa9565b70472b6b9247a4d7d640c1b
Score10/10-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-