General
-
Target
5f75796aef27eae56a003ff8f88d6056915da8c83ac37e4556a685984d1cf23e.zip
-
Size
1KB
-
Sample
230406-zwdbhafb44
-
MD5
2540066770c2a0c03cbacc83a392ddbc
-
SHA1
31e4ba2943872e4136772c07a0e33d5b4a00f161
-
SHA256
b97445e7d371a67b13ccf863c80f48ce9ef0e6996f4af983c72d71ca0f1c57e1
-
SHA512
9b47622a6e77b274a8408ae34651bfb940bc32bcf650678861b36b7a2a137779872ffdf047032bdcf47cefeda4f21d698097e9fb8d8b5d8988db67bd9a3c0d8d
Static task
static1
Behavioral task
behavioral1
Sample
5f75796aef27eae56a003ff8f88d6056915da8c83ac37e4556a685984d1cf23e.js
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
5f75796aef27eae56a003ff8f88d6056915da8c83ac37e4556a685984d1cf23e.js
Resource
win10v2004-20230221-en
Malware Config
Extracted
vjw0rm
http://198.12.123.17:8902
Targets
-
-
Target
5f75796aef27eae56a003ff8f88d6056915da8c83ac37e4556a685984d1cf23e.js
-
Size
3KB
-
MD5
dee56e30a88b69d7f96c6018d4ca0fd1
-
SHA1
bab144a082113b9b4f1b958a7c4a14dc1562eb47
-
SHA256
5f75796aef27eae56a003ff8f88d6056915da8c83ac37e4556a685984d1cf23e
-
SHA512
a010b4dd37ccb65b45d192936142f0f2114c7ad63dd415c212daad83f658ea77a17e5ddbc5dfea8cbf73f3efd40861f5b5de115ea4b15ce0f50f852d6104fed8
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-