General
-
Target
cf8263bd95c97a1b5e3932134a9172c5.bin
-
Size
3KB
-
Sample
230301-b8jgaaeb23
-
MD5
c9e638ef6d6b4ac5e941b2c71937c258
-
SHA1
e20da0792dcc227a392f1ddeea8a7e8241765fb0
-
SHA256
81b9f8cbef011f498682a359eb362e8ba25fb5cb18a7c6197d5ea22a05ffde04
-
SHA512
7932fb9183b737e2f0c9285cc275bd28b14dd915d4eea332f45da13ef533dba48e9542ebef39c35a3f31f317cb6748fdc1b426af51079c9f139afd4faa62407a
Static task
static1
Behavioral task
behavioral1
Sample
3e61b1cfc096af4b8b8371daaf4f233af9d00286232d16159b3ce77a17f3dba7.js
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3e61b1cfc096af4b8b8371daaf4f233af9d00286232d16159b3ce77a17f3dba7.js
Resource
win10v2004-20230220-en
Malware Config
Extracted
vjw0rm
http://66.154.102.135:9909
Targets
-
-
Target
3e61b1cfc096af4b8b8371daaf4f233af9d00286232d16159b3ce77a17f3dba7.unknown
-
Size
99KB
-
MD5
cf8263bd95c97a1b5e3932134a9172c5
-
SHA1
a9b0e170b17e8236b7e55c9399411ef173422737
-
SHA256
3e61b1cfc096af4b8b8371daaf4f233af9d00286232d16159b3ce77a17f3dba7
-
SHA512
c59b797ff20cd94769db06012187d0f54ca8701c3a4bd92ed1661242311e29e6d6ea14fac65fb2607646ab577ef1d5f6351e105a0aa64d3039604d8bbef69ead
-
SSDEEP
192:nluzi75WbAZvs1hdh12cB5kw94tMa3dZYkVdPrv1kc4uIVLk5/lWWWnazewBB5je:cz5Kyy24jHuMqWWyB1KSqmjm
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-