General
-
Target
eVoucher#008891.js
-
Size
10KB
-
Sample
220326-tcvtjseef9
-
MD5
f158edaa4f393576c18586889c2ab62b
-
SHA1
3badef58318a1d1b57560652f26b7afa3581a9ea
-
SHA256
c2a62e3a170efa1a16b18c7c173c4ddda4f5e13e0f6856d1f4226b297cd27c6f
-
SHA512
e23caabe20d5599ab387f7353bad365860cf777c422e8e2ad9d185138af956b5ef37c7376e800df01ce9920b1fa3c8d06507a471fabc7b64b49a9d524d4d7411
Static task
static1
Behavioral task
behavioral1
Sample
eVoucher#008891.js
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
eVoucher#008891.js
Resource
win10v2004-en-20220113
Malware Config
Extracted
vjw0rm
http://zeegod.duckdns.org:9001
Targets
-
-
Target
eVoucher#008891.js
-
Size
10KB
-
MD5
f158edaa4f393576c18586889c2ab62b
-
SHA1
3badef58318a1d1b57560652f26b7afa3581a9ea
-
SHA256
c2a62e3a170efa1a16b18c7c173c4ddda4f5e13e0f6856d1f4226b297cd27c6f
-
SHA512
e23caabe20d5599ab387f7353bad365860cf777c422e8e2ad9d185138af956b5ef37c7376e800df01ce9920b1fa3c8d06507a471fabc7b64b49a9d524d4d7411
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-