General
-
Target
1ZWAJSAR001.zip
-
Size
227KB
-
Sample
230208-rlp9baah4w
-
MD5
4ecbd3551b35ae59e9a5bb159d436e68
-
SHA1
f3de5a4b8cf75b3c20c1f75f23da1db1dc7c74a2
-
SHA256
ea029499fe34a93f01aead168691eb606be5037f2627febffa6c89753f280a51
-
SHA512
3165ba5af07a58f94f22592a64d7f13321317a66dbf815654b941814a2854a8d058fb724676a8dcbe7581d38c329709ec51f5b76e0a24ad248384724a1be60f7
-
SSDEEP
3072:i7/OaUSAykKs/2mGMsc80UEkQwgAY4oIRxhB5ZJpV1lFugy70kT2o5XbQPOjpI:i7q4Ii
Static task
static1
Behavioral task
behavioral1
Sample
1ZWAJSAR001.js
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1ZWAJSAR001.js
Resource
win10v2004-20221111-en
Malware Config
Extracted
vjw0rm
http://sgdghhdh62.duckdns.org:8050
Targets
-
-
Target
1ZWAJSAR001.js
-
Size
300.0MB
-
MD5
16f64a9f1e8298c60d410e649d4f9af6
-
SHA1
4ecbd826dd26c8cb1c83e90b260fabc01fb292b3
-
SHA256
07832ced9085948c808f5d084569f19e7ac6d7ac033d9fe307557b2d62276c43
-
SHA512
99bf973c22c46827ab153f13365cdffeb47a15f300693f5cbf3faaff71a7043e5a7a1c083c2ce2b02cfb085ba3bd77c8c43f6d0fbbfb9cab74e990318f8cde2b
-
SSDEEP
192:KERPOQ5/EwSCSgCoR57ATri9xKrw/SDLaMTiye22k8T4Z1FOJ0ow4:KsOA/EwO4lT9xKrw6DLaM5iTTXaE
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-