General
-
Target
4272d76e2efed7d323e14bccef987913.bin
-
Size
17KB
-
Sample
230724-ccn8bsaa31
-
MD5
386a8e853ebd5538583f77873b6b8960
-
SHA1
ce211887582b1954f98eabaf84497c507176c41d
-
SHA256
483092b7a268b51243e99cdf55f71e30f16edd17fd21f913cabab75811642cf6
-
SHA512
f68357a8ae503052f98240962c53f637d5508db9d106bd71b49b95e39dfa57df90167d6bf87c0a236f11a0e53e35e68cd84ec61899ae2d05e7303fac1c7332d8
-
SSDEEP
384:ToCZHqpCzc5WQshLufGezJ7pWp/CDay873Qw22KT6aCpoqvTscDwg:MCQCXLufDlV8jzHaCpoYTsDg
Static task
static1
Behavioral task
behavioral1
Sample
39372ec10b2720511f8ca94e8aed43273c507637ec03f9a1eac279aadeb22c55.js
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
39372ec10b2720511f8ca94e8aed43273c507637ec03f9a1eac279aadeb22c55.js
Resource
win10v2004-20230703-en
Malware Config
Extracted
vjw0rm
http://severdops.ddns.net:5050
Targets
-
-
Target
39372ec10b2720511f8ca94e8aed43273c507637ec03f9a1eac279aadeb22c55.js
-
Size
24KB
-
MD5
4272d76e2efed7d323e14bccef987913
-
SHA1
a8cde379b41cfafb036896484844620a7fcc11c6
-
SHA256
39372ec10b2720511f8ca94e8aed43273c507637ec03f9a1eac279aadeb22c55
-
SHA512
717ca100e5f2463b8aa675185e2dbd743a015fffe7654dab2b227691ed66e9443a3e387d31c3eeed63a22d1b3f77b213feec3c3fe6c1438ddf5313066f2583a9
-
SSDEEP
384:0B+UO8kwlbBtHS0ihYvG3bMZcCOQHp4aIX6xEzWZNxFlumanjjjIYNFLD5zvOJ:09ewl7tGr+Oy4aPOL13IoFLdzGJ
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-