General
-
Target
customerinvoice.js
-
Size
3KB
-
Sample
230405-gj6heaea5s
-
MD5
ba46627336f749aef1adfd78f958212f
-
SHA1
7fce56ef8cbbf08e12c645d01fa0df595af04cc6
-
SHA256
f1f985bd12efabd68532363a591006c7d6731eb81c3b4dfde0c87923d9d544b0
-
SHA512
bb9fcb11217b045266028693f5028082e3511a12761fb760583886e9fe6ce54f0d082c21fd3a7de8f5c4e31d18a772ccfc34755b6122a2b0bca77b4642e2bfd2
Static task
static1
Behavioral task
behavioral1
Sample
customerinvoice.js
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
customerinvoice.js
Resource
win10v2004-20230220-en
Malware Config
Extracted
vjw0rm
http://198.12.123.17:2402
Targets
-
-
Target
customerinvoice.js
-
Size
3KB
-
MD5
ba46627336f749aef1adfd78f958212f
-
SHA1
7fce56ef8cbbf08e12c645d01fa0df595af04cc6
-
SHA256
f1f985bd12efabd68532363a591006c7d6731eb81c3b4dfde0c87923d9d544b0
-
SHA512
bb9fcb11217b045266028693f5028082e3511a12761fb760583886e9fe6ce54f0d082c21fd3a7de8f5c4e31d18a772ccfc34755b6122a2b0bca77b4642e2bfd2
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-