General
-
Target
H00G4_Invoice_Copy.js
-
Size
10KB
-
Sample
211023-gde39scbb8
-
MD5
b082682e872f7c1ba8efeebf629a4f3f
-
SHA1
aa013d976095c46964405e95ce022224c0a033ae
-
SHA256
a5d5de41b6546981f2284c07aa2fe17ac0b15727fb96fdff33db020a0826810e
-
SHA512
4329c35805fbfac63d683ec1ef69c039bde4fbe8d1951b8b79cf84cbf296556ee5d9e58e6ce77f81fd39cc05eec993775d015b760e77e9fe39d65767c2bb01a9
Static task
static1
Behavioral task
behavioral1
Sample
H00G4_Invoice_Copy.js
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
H00G4_Invoice_Copy.js
Resource
win10-en-20210920
Malware Config
Extracted
vjw0rm
http://gg1592661.duckdns.org:7924
Targets
-
-
Target
H00G4_Invoice_Copy.js
-
Size
10KB
-
MD5
b082682e872f7c1ba8efeebf629a4f3f
-
SHA1
aa013d976095c46964405e95ce022224c0a033ae
-
SHA256
a5d5de41b6546981f2284c07aa2fe17ac0b15727fb96fdff33db020a0826810e
-
SHA512
4329c35805fbfac63d683ec1ef69c039bde4fbe8d1951b8b79cf84cbf296556ee5d9e58e6ce77f81fd39cc05eec993775d015b760e77e9fe39d65767c2bb01a9
Score10/10-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-