General
-
Target
Paid.js
-
Size
6KB
-
Sample
230315-sxgxraea22
-
MD5
89287af70d4358830a78439797416ae6
-
SHA1
7879ab5365b76906f5afacdc0ef212440d8caecc
-
SHA256
52534bdae8aa5b9ba4636d4ba0d9ff60d61e1dc3d1984056ab9968d1c97b3b9c
-
SHA512
56ddf402bb0feee9736500be21984ed659ce9637253ec6681fd59d4612321a789cdea4888eff5e0a4590004ac66c8e3dcde82f9a55efc55927c7f50fa8d03f1d
-
SSDEEP
96:VZH1uy6XIK7om2lcJc9l8ssdKvZ+cpmvjCh2Ja2ZIzaL+AVfliGoVt3Fh9Yqngqu:VZVh7xen2++242ZvqtVHYEFfOSCu8VfX
Static task
static1
Behavioral task
behavioral1
Sample
Paid.js
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Paid.js
Resource
win10v2004-20230220-en
Malware Config
Extracted
vjw0rm
http://ourvjworm.duckdns.org:7974
Targets
-
-
Target
Paid.js
-
Size
6KB
-
MD5
89287af70d4358830a78439797416ae6
-
SHA1
7879ab5365b76906f5afacdc0ef212440d8caecc
-
SHA256
52534bdae8aa5b9ba4636d4ba0d9ff60d61e1dc3d1984056ab9968d1c97b3b9c
-
SHA512
56ddf402bb0feee9736500be21984ed659ce9637253ec6681fd59d4612321a789cdea4888eff5e0a4590004ac66c8e3dcde82f9a55efc55927c7f50fa8d03f1d
-
SSDEEP
96:VZH1uy6XIK7om2lcJc9l8ssdKvZ+cpmvjCh2Ja2ZIzaL+AVfliGoVt3Fh9Yqngqu:VZVh7xen2++242ZvqtVHYEFfOSCu8VfX
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-