General
-
Target
C0083_Invoice_Copy.iso
-
Size
74KB
-
Sample
211012-wpbybachc5
-
MD5
3a2242060b2095e52512ba172b95eb57
-
SHA1
8bb9602aa564bca2d0b295cb4f21c1675474c923
-
SHA256
1ac5463d860af063a8653ef3bc02c6a0a28d089ded5d759530ebe54e8c1da498
-
SHA512
521d2a546df41676a3c29fdb19d81e937f49b7e23c0aa4df0a2bac2563e2c304211330e5b6467ac42af348a3b19fa52a896fa7246ed2c661c5a1db38db926604
Static task
static1
Behavioral task
behavioral1
Sample
C0083_Invoice_Copy.js
Resource
win7v20210408
Malware Config
Extracted
vjw0rm
http://mchristopherr83.duckdns.org:7922
Targets
-
-
Target
C0083_Invoice_Copy.js
-
Size
12KB
-
MD5
7db9fe7b332f94b2c50ce2761b40abfc
-
SHA1
277de0d07f6080d096fe3b2ece7c99ee3167f3ed
-
SHA256
9af04e365ed1f2e0ea04dc71729f0e3341f0f981405c9f3ddd6d6d7b693fb733
-
SHA512
b735fc8a216ba8833ebaa00d7f67969645f78a572d5c92052de36e5433d0842ed73e481aec3a58484d7a3ee36033fe83cfaa9565b70472b6b9247a4d7d640c1b
Score10/10-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-