General
-
Target
sco-4-32023.js
-
Size
3KB
-
Sample
230403-3v5wxade8v
-
MD5
ee0206917e8161e75445007b635ab8b5
-
SHA1
36f4a4a1b46b34cb64ad50872e953191171d68ea
-
SHA256
198783e619d1dd2aa76a91d82c046a911f529d46ab27e96867c26635b1a626dd
-
SHA512
830d87d2a481da60cecc7648fc51a156d7056515c89635a0bc7796370d9787b8c4d1c7a08059bb9514691751b7ec8dc1b8a1d9f6b3aacbbd6598c80543658c16
Static task
static1
Behavioral task
behavioral1
Sample
sco-4-32023.js
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
sco-4-32023.js
Resource
win10v2004-20230220-en
Malware Config
Extracted
vjw0rm
http://198.12.123.17:7402
Targets
-
-
Target
sco-4-32023.js
-
Size
3KB
-
MD5
ee0206917e8161e75445007b635ab8b5
-
SHA1
36f4a4a1b46b34cb64ad50872e953191171d68ea
-
SHA256
198783e619d1dd2aa76a91d82c046a911f529d46ab27e96867c26635b1a626dd
-
SHA512
830d87d2a481da60cecc7648fc51a156d7056515c89635a0bc7796370d9787b8c4d1c7a08059bb9514691751b7ec8dc1b8a1d9f6b3aacbbd6598c80543658c16
Score10/10-
Blocklisted process makes network request
-
Adds Run key to start application
-