General
-
Target
WSQUOM_Invoice009.js
-
Size
23KB
-
Sample
211130-w92dpsbah9
-
MD5
155dfc9ae56dcfde29651063fe46a32b
-
SHA1
5294ccf5be250ada21486abac58a1f6a9b36ba42
-
SHA256
69177cc4ac05e4287486bc3b24816762894c3275124b4a20a7671b48bff2b336
-
SHA512
6673f8c63e7588e5bc483cf8982839b9f8097624399722803047892dd5530cf360e29472d3392a4b6305680c51e59dab378ca72f1089b74a4d1b06a210899b72
Static task
static1
Behavioral task
behavioral1
Sample
WSQUOM_Invoice009.js
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
WSQUOM_Invoice009.js
Resource
win10-en-20211104
Malware Config
Extracted
vjw0rm
http://37.0.10.5:8020
Targets
-
-
Target
WSQUOM_Invoice009.js
-
Size
23KB
-
MD5
155dfc9ae56dcfde29651063fe46a32b
-
SHA1
5294ccf5be250ada21486abac58a1f6a9b36ba42
-
SHA256
69177cc4ac05e4287486bc3b24816762894c3275124b4a20a7671b48bff2b336
-
SHA512
6673f8c63e7588e5bc483cf8982839b9f8097624399722803047892dd5530cf360e29472d3392a4b6305680c51e59dab378ca72f1089b74a4d1b06a210899b72
Score10/10-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-