General
-
Target
File 1.js
-
Size
29KB
-
Sample
220616-mrm9paecdl
-
MD5
5b249001231021d53f6e80d07e4e5f5b
-
SHA1
1266796493db1d6e635684d96c61c92a4f7dc93e
-
SHA256
34d8e5b4d562e391ef5aa0e06738593ea6d1f28710bf3d8c091ac706614cc2f2
-
SHA512
d8200f7ac947d92493e17284bc249230181e1dc1bf4192da3b33e37e05faed356dd4dc6bda234128db75a866ccce67c28b5cc3beef4a19b001dab8c4faa7c29f
Static task
static1
Behavioral task
behavioral1
Sample
File 1.js
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
File 1.js
Resource
win10v2004-20220414-en
Malware Config
Extracted
vjw0rm
http://104.168.7.110:7974
Targets
-
-
Target
File 1.js
-
Size
29KB
-
MD5
5b249001231021d53f6e80d07e4e5f5b
-
SHA1
1266796493db1d6e635684d96c61c92a4f7dc93e
-
SHA256
34d8e5b4d562e391ef5aa0e06738593ea6d1f28710bf3d8c091ac706614cc2f2
-
SHA512
d8200f7ac947d92493e17284bc249230181e1dc1bf4192da3b33e37e05faed356dd4dc6bda234128db75a866ccce67c28b5cc3beef4a19b001dab8c4faa7c29f
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-