General
-
Target
1133543545.js
-
Size
6KB
-
Sample
230317-xkrzeabf2w
-
MD5
fb50b5a527b81faf53eb766fc69645e2
-
SHA1
30b12f026d2122f487973235e5d46651a3040996
-
SHA256
786b63ecc1fb8174eb1301a5498ba858ccac1978cb745afde8c8cd22c7c962af
-
SHA512
6651176c8cf7815ea48790044873e9b4de1696bba52b2851217b392f5f2ab52bd807f07ac7ce115350520e5e3673be9425ff1fe46afae0ccccb058fd03b01481
-
SSDEEP
192:CZVh76ew2V2ZIPoH5Xi4FvfkumcR9E+dir8OE3:0V0ooH5Xi4xfkL3pIz3
Static task
static1
Behavioral task
behavioral1
Sample
1133543545.js
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1133543545.js
Resource
win10v2004-20230220-en
Malware Config
Extracted
vjw0rm
http://ourvjworm.duckdns.org:7974
Targets
-
-
Target
1133543545.js
-
Size
6KB
-
MD5
fb50b5a527b81faf53eb766fc69645e2
-
SHA1
30b12f026d2122f487973235e5d46651a3040996
-
SHA256
786b63ecc1fb8174eb1301a5498ba858ccac1978cb745afde8c8cd22c7c962af
-
SHA512
6651176c8cf7815ea48790044873e9b4de1696bba52b2851217b392f5f2ab52bd807f07ac7ce115350520e5e3673be9425ff1fe46afae0ccccb058fd03b01481
-
SSDEEP
192:CZVh76ew2V2ZIPoH5Xi4FvfkumcR9E+dir8OE3:0V0ooH5Xi4xfkL3pIz3
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-