General
-
Target
43d7fa52f4e690c362da25aac8b4c8feb5620ee8dc6cf21bb2e998e9297abcbd.js
-
Size
101KB
-
Sample
240424-bqjpbsde8s
-
MD5
e55375df88bf966f94390291cbf23a4a
-
SHA1
541be41c314dbc0ef00f5fc43b60d473803a4d4b
-
SHA256
43d7fa52f4e690c362da25aac8b4c8feb5620ee8dc6cf21bb2e998e9297abcbd
-
SHA512
6504b4d7912f28a738150f89e4523cab730276011cfca9401b1f940a05e7207a22d34c2c3103c7463cdbda8334fe2822b0085f51f7881142dafa26ae519b45f7
-
SSDEEP
3072:FRQvg9BY85CWYRoI2jRQvg9BY85CWYRoI2I:FRQv0q85CWYRz2jRQv0q85CWYRz2I
Static task
static1
Behavioral task
behavioral1
Sample
43d7fa52f4e690c362da25aac8b4c8feb5620ee8dc6cf21bb2e998e9297abcbd.js
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
43d7fa52f4e690c362da25aac8b4c8feb5620ee8dc6cf21bb2e998e9297abcbd.js
Resource
win10v2004-20240412-en
Malware Config
Extracted
vjw0rm
http://vjwmaster.duckdns.org:9987
Targets
-
-
Target
43d7fa52f4e690c362da25aac8b4c8feb5620ee8dc6cf21bb2e998e9297abcbd.js
-
Size
101KB
-
MD5
e55375df88bf966f94390291cbf23a4a
-
SHA1
541be41c314dbc0ef00f5fc43b60d473803a4d4b
-
SHA256
43d7fa52f4e690c362da25aac8b4c8feb5620ee8dc6cf21bb2e998e9297abcbd
-
SHA512
6504b4d7912f28a738150f89e4523cab730276011cfca9401b1f940a05e7207a22d34c2c3103c7463cdbda8334fe2822b0085f51f7881142dafa26ae519b45f7
-
SSDEEP
3072:FRQvg9BY85CWYRoI2jRQvg9BY85CWYRoI2I:FRQv0q85CWYRz2jRQv0q85CWYRz2I
Score10/10-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-