General
-
Target
7615786119.zip
-
Size
41KB
-
Sample
220620-pkl46adagp
-
MD5
189cdb5fe6fa4eb365942b0604f997ae
-
SHA1
8451784814b41bee3b4dfef389f17b5485aa0291
-
SHA256
f2c0c7e926d66df5fad3e991b038d6b2f2609efdab00b6e99ccc0ad27dee0260
-
SHA512
556c1526735499c699dfc70d0b711cf723a896cb9a5d890d56cb26f982d2a1166e0ab7ee651b872c0f9893d58a2f9593ad90185d9c822b7f497b053505ace0fe
Static task
static1
Behavioral task
behavioral1
Sample
ca905686651e423399d864687173d5472e4ecdbc76ea201b46d23012c799b617.js
Resource
win10-20220414-en
Behavioral task
behavioral2
Sample
ca905686651e423399d864687173d5472e4ecdbc76ea201b46d23012c799b617.js
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
ca905686651e423399d864687173d5472e4ecdbc76ea201b46d23012c799b617
-
Size
107KB
-
MD5
05d29ef471cbead69dd8c6f56a900004
-
SHA1
fa017cb4a1ad381d6b0569f7ec50791822350ba4
-
SHA256
ca905686651e423399d864687173d5472e4ecdbc76ea201b46d23012c799b617
-
SHA512
81f86970b830533d080e1627ffbb2bb4148a71b0bc9692553928f5f6671c4c8b2bc2d7648adb3b6d61bab2fc8437ab9ecff344d382af2701645b5b9e17eefd08
Score10/10-
suricata: ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm Checkin UA
suricata: ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm Checkin UA
-
suricata: ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1
suricata: ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-