General
-
Target
1ZWAJSAR001.vhd
-
Size
6.0MB
-
Sample
230208-nykmtaaf33
-
MD5
2741962d66669cd7ab60aaa77068c5c4
-
SHA1
3733140484d2cafe4db60966d008b8c5aa004b7a
-
SHA256
524c411868be9769efa1197add86395053157040e26310efa2648c4b0f8bc50d
-
SHA512
da8319f0d049dacb4fbebc00c8fcc0b4d0f048105c63e44c9282785cb6ccff4733ad3d55d2917a3225c68408a04dacfaf378cad67005b7147b6f92a3e8624f4d
-
SSDEEP
12288:ob9Xn7Mu3qI70c9viIRub9Xn7Mu3qI70c9viIRR:oJX7MA0c9vxkJX7MA0c9vxn
Static task
static1
Behavioral task
behavioral1
Sample
1ZWAJSAR001.js
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1ZWAJSAR001.js
Resource
win10v2004-20220812-en
Malware Config
Extracted
vjw0rm
http://sgdghhdh62.duckdns.org:8050
Targets
-
-
Target
1ZWAJSAR001.js
-
Size
300.0MB
-
MD5
16f64a9f1e8298c60d410e649d4f9af6
-
SHA1
4ecbd826dd26c8cb1c83e90b260fabc01fb292b3
-
SHA256
07832ced9085948c808f5d084569f19e7ac6d7ac033d9fe307557b2d62276c43
-
SHA512
99bf973c22c46827ab153f13365cdffeb47a15f300693f5cbf3faaff71a7043e5a7a1c083c2ce2b02cfb085ba3bd77c8c43f6d0fbbfb9cab74e990318f8cde2b
-
SSDEEP
192:KERPOQ5/EwSCSgCoR57ATri9xKrw/SDLaMTiye22k8T4Z1FOJ0ow4:KsOA/EwO4lT9xKrw6DLaM5iTTXaE
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-