General
-
Target
WTRMAOSP.iso
-
Size
70KB
-
Sample
211220-wjky2abdd9
-
MD5
2a0e836763975b44c00098e0c747af52
-
SHA1
d04ba2b0688ac073d6d9b2e6837030419f42e13b
-
SHA256
b1bef9b67f5d2d8e4bf872fcb4a9f3776c1e06fde5711070a1dc634fae637e35
-
SHA512
728f31aec41e70471a848da1b4bce9d96d27095cfbdf360d7b702a29f9819651bd83a0d133951b86a34a53930ddd06f2d3bbbb6483eec3c39ca8d0efb7c00f2a
Static task
static1
Behavioral task
behavioral1
Sample
WTRMAOSP.js
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
WTRMAOSP.js
Resource
win10-en-20211208
Malware Config
Extracted
vjw0rm
http://moneyworm.duckdns.org:8756
Targets
-
-
Target
WTRMAOSP.js
-
Size
9KB
-
MD5
09f5d89a8c21d1c7602463e423c07b8a
-
SHA1
30968c850326a008743fbc5639c60ce8371bba7d
-
SHA256
d4b12da63e87619d8a738dbedcae1ec2af9372a402d54df3b5f3006a649b566d
-
SHA512
dc1259774c73452e4f43ff873b80f7895de35e118d3ad0cc2b5b3fc47f829d9fd5e2dc6bcd48abd64614f275a8b2e45e0ffeff74a6476b98584d80141c86fb31
Score10/10-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-