General
-
Target
dee56e30a88b69d7f96c6018d4ca0fd1.bin
-
Size
1KB
-
Sample
230408-c1rclade8v
-
MD5
b0e51bf031aded5d17e108352a529fc4
-
SHA1
50b727f93f4f94e7e5a34f5ad8a4d9aa0edd749e
-
SHA256
dabb37b209d8aba7a220f1f3672ee1ef78cd9e89db83b7383ccfbd214a8fa51d
-
SHA512
417b9f1c01e4e8274407c7b083487848006b0871e8df1055163b4155da7b97237a5a7b4fabe4bccfe4b52c63f60a9accad0b02afbdae619fb29fd33881df5463
Static task
static1
Behavioral task
behavioral1
Sample
5f75796aef27eae56a003ff8f88d6056915da8c83ac37e4556a685984d1cf23e.js
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
5f75796aef27eae56a003ff8f88d6056915da8c83ac37e4556a685984d1cf23e.js
Resource
win10v2004-20230220-en
Malware Config
Extracted
vjw0rm
http://198.12.123.17:8902
Targets
-
-
Target
5f75796aef27eae56a003ff8f88d6056915da8c83ac37e4556a685984d1cf23e.js
-
Size
3KB
-
MD5
dee56e30a88b69d7f96c6018d4ca0fd1
-
SHA1
bab144a082113b9b4f1b958a7c4a14dc1562eb47
-
SHA256
5f75796aef27eae56a003ff8f88d6056915da8c83ac37e4556a685984d1cf23e
-
SHA512
a010b4dd37ccb65b45d192936142f0f2114c7ad63dd415c212daad83f658ea77a17e5ddbc5dfea8cbf73f3efd40861f5b5de115ea4b15ce0f50f852d6104fed8
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-