General
-
Target
receipt#009.js
-
Size
376KB
-
Sample
220112-1dl2cseagq
-
MD5
ffd5990d98bc47c9afcc11f8598659ee
-
SHA1
869c90b42db526e1bc528d344882f8efb298d357
-
SHA256
e510b8ef2e0644798c793d22303014ae443230c788c8dac026bf966f27779266
-
SHA512
eec0b5fd6bffa6bc2c0fceea752c443227a89231558cb2834643aa28a747d2970e1d4091628f0e186b27936f77df549470a41417ba7de2d2648dad5da6f63b1f
Static task
static1
Behavioral task
behavioral1
Sample
receipt#009.js
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
receipt#009.js
Resource
win10-en-20211208
Malware Config
Extracted
vjw0rm
http://warrr.duckdns.org:9997
Targets
-
-
Target
receipt#009.js
-
Size
376KB
-
MD5
ffd5990d98bc47c9afcc11f8598659ee
-
SHA1
869c90b42db526e1bc528d344882f8efb298d357
-
SHA256
e510b8ef2e0644798c793d22303014ae443230c788c8dac026bf966f27779266
-
SHA512
eec0b5fd6bffa6bc2c0fceea752c443227a89231558cb2834643aa28a747d2970e1d4091628f0e186b27936f77df549470a41417ba7de2d2648dad5da6f63b1f
Score10/10-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-