General
-
Target
IQ02072023.js
-
Size
3KB
-
Sample
230208-xb1vysde9z
-
MD5
e55ffbc87d1b5a8b7b6b97d2d75aea7e
-
SHA1
880ca6bea076d325344edb38d37750fc58735c49
-
SHA256
7212024ec92f9bc4867ffbf22c146196ed32baa4321f4c46f778a38d2cf12985
-
SHA512
7708510a67192e6abba180d57d63c5d906a512c1939f04efec3b749e333f3ad495ddd5c330e24ad8164c3582ce00b8ac8e506268bcae1eef9efca7c3e1e7c059
Static task
static1
Behavioral task
behavioral1
Sample
IQ02072023.js
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
IQ02072023.js
Resource
win10v2004-20221111-en
Malware Config
Extracted
vjw0rm
http://209.127.19.155:5870
Targets
-
-
Target
IQ02072023.js
-
Size
3KB
-
MD5
e55ffbc87d1b5a8b7b6b97d2d75aea7e
-
SHA1
880ca6bea076d325344edb38d37750fc58735c49
-
SHA256
7212024ec92f9bc4867ffbf22c146196ed32baa4321f4c46f778a38d2cf12985
-
SHA512
7708510a67192e6abba180d57d63c5d906a512c1939f04efec3b749e333f3ad495ddd5c330e24ad8164c3582ce00b8ac8e506268bcae1eef9efca7c3e1e7c059
Score10/10-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-