General
-
Target
malware.js
-
Size
7KB
-
Sample
230221-y8zjtsge25
-
MD5
c3b58ced711567b33db3d17ecf6a4c32
-
SHA1
7dd3e64d4576bf4def0a07f3494342acf1a29624
-
SHA256
a0df29850e5b36e8d787df718b9c261008e38e656de981fbb6f974dc85e6dfb4
-
SHA512
fc2327bfedd54b8d43a6a79b9c1526e12c35de0bda711b89505c8b41e0fb14c1cccec6b71cb3545394897c264f8f4ba5e68074a7e7e5ef9039c3241125c1669b
-
SSDEEP
192:eA7/AIwPI9xHUn0zRblHk33+/VGzZC3BUOhOOZKdz:l/vmaxNRblHOqmOpi
Static task
static1
Behavioral task
behavioral1
Sample
malware.js
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
malware.js
Resource
win10v2004-20230220-en
Malware Config
Extracted
vjw0rm
http://jamnnd.duckdns.org:8024
Targets
-
-
Target
malware.js
-
Size
7KB
-
MD5
c3b58ced711567b33db3d17ecf6a4c32
-
SHA1
7dd3e64d4576bf4def0a07f3494342acf1a29624
-
SHA256
a0df29850e5b36e8d787df718b9c261008e38e656de981fbb6f974dc85e6dfb4
-
SHA512
fc2327bfedd54b8d43a6a79b9c1526e12c35de0bda711b89505c8b41e0fb14c1cccec6b71cb3545394897c264f8f4ba5e68074a7e7e5ef9039c3241125c1669b
-
SSDEEP
192:eA7/AIwPI9xHUn0zRblHk33+/VGzZC3BUOhOOZKdz:l/vmaxNRblHOqmOpi
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-