General
-
Target
b2m1_Payment_receipt.js
-
Size
81KB
-
Sample
211026-vbj64ahhh7
-
MD5
983be3951a672b11ebdfd6d7d1233299
-
SHA1
bb0e6da5abae02fcbefa6f1a619c6f3b1a3bf5a8
-
SHA256
1d31f4d9800687307188f1527d2c512249b972426e8ed4be143467ff2d9183f3
-
SHA512
67fdb9bc954ec67f83e0febdc2510665b8249af6ae00781ae02fca5b51b34a55fb4fd8c878969a49182a3cc29dc1f7d8328d56f8ab90df655222e9f4a8ed703c
Static task
static1
Behavioral task
behavioral1
Sample
b2m1_Payment_receipt.js
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
b2m1_Payment_receipt.js
Resource
win10-en-20210920
Malware Config
Extracted
vjw0rm
http://6200js.duckdns.org:6200
Targets
-
-
Target
b2m1_Payment_receipt.js
-
Size
81KB
-
MD5
983be3951a672b11ebdfd6d7d1233299
-
SHA1
bb0e6da5abae02fcbefa6f1a619c6f3b1a3bf5a8
-
SHA256
1d31f4d9800687307188f1527d2c512249b972426e8ed4be143467ff2d9183f3
-
SHA512
67fdb9bc954ec67f83e0febdc2510665b8249af6ae00781ae02fca5b51b34a55fb4fd8c878969a49182a3cc29dc1f7d8328d56f8ab90df655222e9f4a8ed703c
Score10/10-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-