General
-
Target
GKOPEWRYU.iso
-
Size
122KB
-
Sample
211220-wj6kqsccbl
-
MD5
697f93ec8a97a34fe7b9bdea5402f5bc
-
SHA1
79c6167d15683955acf57bfb27ffaf95e744c6ef
-
SHA256
3829deaf6c93e3b738facd283001b5fa40fb0f6d74f834e815dbb0a552d73383
-
SHA512
138dac98b4d52ac744f5855f814148996f58195f3c3bdfe63366719e9561d4cccfdde8961fdf8a210e7c33e54be19c05bd5e49518b599b9386e153216c8db90c
Static task
static1
Behavioral task
behavioral1
Sample
GKOPEWRYU.js
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
GKOPEWRYU.js
Resource
win10-en-20211208
Malware Config
Extracted
vjw0rm
http://moneyworm.duckdns.org:8756
Targets
-
-
Target
GKOPEWRYU.js
-
Size
61KB
-
MD5
6c65767545d7ad14fa6f2aa28fdd37e1
-
SHA1
7a31fc2c58c387e538b8d2c6e288cfacee899ea2
-
SHA256
4659be2ae1f69a483f84a858f35ab0b184031a1dbdccfb8b89decaa75004f249
-
SHA512
73161f26b1cbd297c89a7b9811837b3bae6a44bf022aadd94ec1c57daddc2092c43809b002e4aab2cd59ecd2cb8ad106ede24d459be2831bf38537c6b8396ea8
Score10/10-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-