General
-
Target
TZK00UWRTQ002.js
-
Size
9KB
-
Sample
211222-xcw86agfcp
-
MD5
5d0e8c847065aa21cc27b2754d5b2b23
-
SHA1
dc386566971cf693954cc55df6d6c509081221ac
-
SHA256
daf0babcdc3283dd81fcd4522978cdfd900c0edd44cc3ad6c7b24433a221c796
-
SHA512
3a639791404fc7b02163b1230b381d0258ff7fd1ed61e638837e30a12c12eebb8ea9cd53a6ab0d8374fc916367a15a8075a39f9478039120a1e028e85af0c173
Static task
static1
Behavioral task
behavioral1
Sample
TZK00UWRTQ002.js
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
TZK00UWRTQ002.js
Resource
win10-en-20211208
Malware Config
Extracted
vjw0rm
http://wormmy.duckdns.org:8990
Targets
-
-
Target
TZK00UWRTQ002.js
-
Size
9KB
-
MD5
5d0e8c847065aa21cc27b2754d5b2b23
-
SHA1
dc386566971cf693954cc55df6d6c509081221ac
-
SHA256
daf0babcdc3283dd81fcd4522978cdfd900c0edd44cc3ad6c7b24433a221c796
-
SHA512
3a639791404fc7b02163b1230b381d0258ff7fd1ed61e638837e30a12c12eebb8ea9cd53a6ab0d8374fc916367a15a8075a39f9478039120a1e028e85af0c173
Score10/10-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-