General
-
Target
fcbc47c05086a6ae45641ab4f48994ba58af0eaac140670184d050612f838df3.zip
-
Size
165KB
-
Sample
240419-cn75ksdh66
-
MD5
987afffc48e4f2f07ccd34609f51e2af
-
SHA1
9c57f58607e3bcb8345b9291c51678b6024eaaab
-
SHA256
fcbc47c05086a6ae45641ab4f48994ba58af0eaac140670184d050612f838df3
-
SHA512
6055d5f0a5e09a50d22ba6f0ca7b0e4c843bc52c1efdc90fe7c09c4074c4598301308fe98b93d5a3ced25af62f94a455a20fe514f5c73ace0a44546597ff6b70
-
SSDEEP
3072:VUqIBRpbpiWFWwxnGWqpD8vKEUdUdE4yEEV1/3cSy/jxQ+RGp5pp7PZgv5cZcJ1:ivbpZowE18vKEEdhN1/MR/FzsLacG
Static task
static1
Behavioral task
behavioral1
Sample
Vero4.js
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Vero4.js
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
Vero4.js
-
Size
327KB
-
MD5
37e45dbfff34d48a662c09fa2a701033
-
SHA1
8de5d89a77461f5b5aff8b030eef8e891753b64d
-
SHA256
aa45132774d0eac10eda0bc43c9b583576e0e872bae94786a38fdb187101f0af
-
SHA512
7a63d2231eba566bfbb4f4f9960ea44012719a4e97040c9adc3037dadf35216faad4449c85159da936ac9132321ef7a9a50a214c57a290f37878b46c3d32d5e0
-
SSDEEP
6144:0ICvLuGUlwFwvP6IoPazJqw2zYo6/wIZ3n:0ICv6GUwbWwIJn
Score8/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-