General
-
Target
Jsreceipt0193617_PDF.HTML
-
Size
103B
-
Sample
230629-2pcgqsfd55
-
MD5
c349aed7796c6cf3784b423f7a348429
-
SHA1
1f9f048f524a83ad569e0df65b709bc1de4f344f
-
SHA256
07176693f0658bb82e3408ef1e85a545b039acf315749ce888dfce55252696cc
-
SHA512
f505e8dfd29079f11b817204334e65a6c307e6bed8d5a04a7a95fef32bf4031040ef7830b7f039f596c904a489de2887d0903016204e1e78b9715126ccb1e455
Static task
static1
Behavioral task
behavioral1
Sample
Jsreceipt0193617_PDF.html
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
Jsreceipt0193617_PDF.html
Resource
win10-20230621-en
Malware Config
Extracted
vjw0rm
http://jsnew9400.duckdns.org:9400
Targets
-
-
Target
Jsreceipt0193617_PDF.HTML
-
Size
103B
-
MD5
c349aed7796c6cf3784b423f7a348429
-
SHA1
1f9f048f524a83ad569e0df65b709bc1de4f344f
-
SHA256
07176693f0658bb82e3408ef1e85a545b039acf315749ce888dfce55252696cc
-
SHA512
f505e8dfd29079f11b817204334e65a6c307e6bed8d5a04a7a95fef32bf4031040ef7830b7f039f596c904a489de2887d0903016204e1e78b9715126ccb1e455
Score10/10-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-