General
-
Target
Account sheet .jpg.js
-
Size
15KB
-
Sample
211130-hrhlzsebck
-
MD5
df9656ed02964c805f934e28abf9ebee
-
SHA1
76ab9cc502134c1c9a45d77e43bdb1c8273d43a8
-
SHA256
7708fbfa03f5eb10ade6b19f0a09af9c9ec4f6353e6be67ab045dca5d2e3b801
-
SHA512
cd457985dd298de401f0c0d06c4e2cb13c1c4833cbac97e2db9fd038da741b2d77a5566328ef1768a9b728345d8c18924c1f818413d5edc56d5b57386eb63566
Static task
static1
Behavioral task
behavioral1
Sample
Account sheet .jpg.js
Resource
win7-en-20211014
Malware Config
Extracted
vjw0rm
http://77.247.110.107:7849
Targets
-
-
Target
Account sheet .jpg.js
-
Size
15KB
-
MD5
df9656ed02964c805f934e28abf9ebee
-
SHA1
76ab9cc502134c1c9a45d77e43bdb1c8273d43a8
-
SHA256
7708fbfa03f5eb10ade6b19f0a09af9c9ec4f6353e6be67ab045dca5d2e3b801
-
SHA512
cd457985dd298de401f0c0d06c4e2cb13c1c4833cbac97e2db9fd038da741b2d77a5566328ef1768a9b728345d8c18924c1f818413d5edc56d5b57386eb63566
-
Blocklisted process makes network request
-
Drops startup file
-