General
-
Target
Spécifications de la commande.zip
-
Size
18KB
-
Sample
230721-qnnmtseh28
-
MD5
7071340bb289d8b9e9c4487aa5f97391
-
SHA1
f9b3458b6ef9e2b52467de8ddf5580cfee6af92a
-
SHA256
6b2b1415c898b1c1770ba62a1ecfb870a626a47d3f72811f803c2ec651808b71
-
SHA512
dedd833d46d02cbc088e1ff8c9272b32e72b75d3199a286df49110ffc26c114272aac412a06786f441187db32d225f349c398b5e73dbbf8dfb6514f340b2b19c
-
SSDEEP
384:NSritTwvlIzSyaT7TnyTAwZrqdCvRJ0mQTxWRIwpgeV0ajgyWpwXIRPbB:RtCSSya7TIA+rqdCJPQxHeZMuXK
Static task
static1
Behavioral task
behavioral1
Sample
Spécifications de la commande.js
Resource
win10v2004-20230703-en
Malware Config
Extracted
vjw0rm
http://severdops.ddns.net:5050
Targets
-
-
Target
Spécifications de la commande.js
-
Size
26KB
-
MD5
890730ddebf9affaebc94bd26ca5ba14
-
SHA1
184fd52a0525b68c964f2b1c68fc7ed0f93a41b2
-
SHA256
822b0e065dd9e5bb4441ab4e7641f73e34d240272b2c664141d07abdd0ed7f2d
-
SHA512
77220a8c9c38a2fd5bf31243e52ea9eb50429cd2554b7709d19beae64076208b10bdb9e4e76cee2a931a871a763a5a7a7b4adefb18c7eaeac7b38fc1e7c6476a
-
SSDEEP
768:LqWqIHKOv52EIhyW3ub2SlnnPYEJr8sv/hFXpMkdDkyO:LqWzHB5GhbuqSlnwj+JppMcIyO
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-