General
-
Target
New_Order.js
-
Size
121KB
-
Sample
220613-smnybadca4
-
MD5
10618f9206270556b21eed02cff7efb6
-
SHA1
997c8dcde0cbc67164212dc9091e2971620511a9
-
SHA256
b908d37c8fd6804048f23376159e0610b48b0bc3dda2ba4876d69da4fbed4d77
-
SHA512
de363de443370113bb2d41249d707321dd066cbd15b4f17589924a255815a9618d2ee8cc617b85d8103415b60654c89546f549efb7283d984714571cdea56f22
Static task
static1
Behavioral task
behavioral1
Sample
New_Order.js
Resource
win10-20220414-en
Malware Config
Extracted
vjw0rm
http://franmhort.duia.ro:8152
Targets
-
-
Target
New_Order.js
-
Size
121KB
-
MD5
10618f9206270556b21eed02cff7efb6
-
SHA1
997c8dcde0cbc67164212dc9091e2971620511a9
-
SHA256
b908d37c8fd6804048f23376159e0610b48b0bc3dda2ba4876d69da4fbed4d77
-
SHA512
de363de443370113bb2d41249d707321dd066cbd15b4f17589924a255815a9618d2ee8cc617b85d8103415b60654c89546f549efb7283d984714571cdea56f22
Score10/10-
suricata: ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm Checkin UA
suricata: ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm Checkin UA
-
suricata: ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1
suricata: ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1
-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-