General
-
Target
INVOICETW002.js
-
Size
9.0MB
-
Sample
230216-m99kmsgh61
-
MD5
ad72675c63043b6516dc19c5bd3c54fa
-
SHA1
6e11de29ef4ea95947a224a6f1b368268f9c2be3
-
SHA256
93a3bcccf1a3ae246ff754f0ef386d9e76367a14968e8a48c1993b403e43ba24
-
SHA512
a95f846ded44e64c6ad8057927e557a571eeb857761e7b190ec1873cf2cbf396f1458cf95bd0ac25d500c43197fbd4149f512d75182271155a28d8ccd2cfc950
-
SSDEEP
192:SB41HdWH9RPX9xkOS+0pkyTKuwWXgXS9B64/K20+WSH:qqHYdl9xkOSOyuWXgXx2T
Static task
static1
Behavioral task
behavioral1
Sample
INVOICETW002.js
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
INVOICETW002.js
Resource
win10v2004-20220812-en
Malware Config
Extracted
vjw0rm
http://mikemons767.duckdns.org:8023
Targets
-
-
Target
INVOICETW002.js
-
Size
9.0MB
-
MD5
ad72675c63043b6516dc19c5bd3c54fa
-
SHA1
6e11de29ef4ea95947a224a6f1b368268f9c2be3
-
SHA256
93a3bcccf1a3ae246ff754f0ef386d9e76367a14968e8a48c1993b403e43ba24
-
SHA512
a95f846ded44e64c6ad8057927e557a571eeb857761e7b190ec1873cf2cbf396f1458cf95bd0ac25d500c43197fbd4149f512d75182271155a28d8ccd2cfc950
-
SSDEEP
192:SB41HdWH9RPX9xkOS+0pkyTKuwWXgXS9B64/K20+WSH:qqHYdl9xkOSOyuWXgXx2T
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-