General
-
Target
528452ce702d1bc05f0c968137625ae1518faf152aeac200948e39974c6ef4cf.js
-
Size
307KB
-
Sample
211213-y3m9lsfdbn
-
MD5
d3d3edd039a3e591e822bb981e7e1fc7
-
SHA1
dc79c1c6268f32dbe746394868db3d23bd4e4126
-
SHA256
528452ce702d1bc05f0c968137625ae1518faf152aeac200948e39974c6ef4cf
-
SHA512
f377e3a8d3816130cf5db479e980bfad2b2dc13b86b7eee297b0fb9982a808751e429bbd10263fa6b61a066869e67bb88205ae83f27d5527e99cd7c9b5dfba95
Static task
static1
Behavioral task
behavioral1
Sample
528452ce702d1bc05f0c968137625ae1518faf152aeac200948e39974c6ef4cf.js
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
528452ce702d1bc05f0c968137625ae1518faf152aeac200948e39974c6ef4cf.js
Resource
win10-en-20211208
Malware Config
Extracted
vjw0rm
http://dwal-vesj.duckdns.org:29563
Targets
-
-
Target
528452ce702d1bc05f0c968137625ae1518faf152aeac200948e39974c6ef4cf.js
-
Size
307KB
-
MD5
d3d3edd039a3e591e822bb981e7e1fc7
-
SHA1
dc79c1c6268f32dbe746394868db3d23bd4e4126
-
SHA256
528452ce702d1bc05f0c968137625ae1518faf152aeac200948e39974c6ef4cf
-
SHA512
f377e3a8d3816130cf5db479e980bfad2b2dc13b86b7eee297b0fb9982a808751e429bbd10263fa6b61a066869e67bb88205ae83f27d5527e99cd7c9b5dfba95
Score10/10-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-