General
-
Target
Receipt.js
-
Size
3KB
-
Sample
230308-hd1kmsed55
-
MD5
b226987db14d44762e9ebefcda95e144
-
SHA1
d86eac68820c39703e52142d3bf450525a9f8d6c
-
SHA256
6de643d185952a9903ab06d382c4373e516329536734d90be309004afaa5ea50
-
SHA512
c937e645be893774627bb9849c043f0ce0f9a35b39e843d2489124eaafe650ad55002dc90d1df68e6815950fb8f197a3cee73282eea19b2a701600aaba7775f2
Static task
static1
Behavioral task
behavioral1
Sample
Receipt.js
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Receipt.js
Resource
win10v2004-20230220-en
Malware Config
Extracted
vjw0rm
http://ourvjworm.duckdns.org:7974
Targets
-
-
Target
Receipt.js
-
Size
3KB
-
MD5
b226987db14d44762e9ebefcda95e144
-
SHA1
d86eac68820c39703e52142d3bf450525a9f8d6c
-
SHA256
6de643d185952a9903ab06d382c4373e516329536734d90be309004afaa5ea50
-
SHA512
c937e645be893774627bb9849c043f0ce0f9a35b39e843d2489124eaafe650ad55002dc90d1df68e6815950fb8f197a3cee73282eea19b2a701600aaba7775f2
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-