General
-
Target
Order32763.js
-
Size
23KB
-
Sample
211130-g7rn6ahbc9
-
MD5
e4eb55ac626bc25b72296d2dd2b1f3fb
-
SHA1
7576d84093c04f1fe086100dc577d542fc7960d5
-
SHA256
a642b246cc03750cb7968703d5a17b8c3823599cfc78d9dcc7d6b8e613f98bb3
-
SHA512
f7f12bdeba8496182f06e26859b270d2d84b7435ef0bb5b2d867c272503f2c0755e4670044157cf3f542ae3bcaee534ec6a7b67c52f3d3f8d80ae830828eec8a
Static task
static1
Behavioral task
behavioral1
Sample
Order32763.js
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
Order32763.js
Resource
win10-en-20211104
Malware Config
Extracted
vjw0rm
http://37.120.137.227:29563
Targets
-
-
Target
Order32763.js
-
Size
23KB
-
MD5
e4eb55ac626bc25b72296d2dd2b1f3fb
-
SHA1
7576d84093c04f1fe086100dc577d542fc7960d5
-
SHA256
a642b246cc03750cb7968703d5a17b8c3823599cfc78d9dcc7d6b8e613f98bb3
-
SHA512
f7f12bdeba8496182f06e26859b270d2d84b7435ef0bb5b2d867c272503f2c0755e4670044157cf3f542ae3bcaee534ec6a7b67c52f3d3f8d80ae830828eec8a
Score10/10-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-