Deep dive into JS/Vjw0rm
Tags
Common Information
Type | Value |
---|---|
UUID | 0c62db3c-2ee4-4cd6-aa52-9416b6946896 |
Fingerprint | aa836943293f239d |
Analysis status | DONE |
Considered CTI value | 2 |
Text language | |
Published | March 28, 2023, 1:34 p.m. |
Added to db | March 28, 2023, 3:59 p.m. |
Last updated | Nov. 17, 2024, 6:31 p.m. |
Headline | Deep dive into JS/Vjw0rm |
Title | Deep dive into JS/Vjw0rm |
Detected Hints/Tags/Attributes | 42/1/15 |
Source URLs
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 136 | ✔ | InfoSec Write-ups - Medium | https://infosecwriteups.com/feed | 2024-08-30 22:08 |
Details | 163 | ✔ | — | https://media.cert.europa.eu/rss?type=category&id=Malware&language=en&duplicates=false | 2024-08-30 22:08 |
Details | 172 | ✔ | Reverse Engineering on Medium | https://medium.com/feed/tag/reverse-engineering | 2024-08-30 22:08 |
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 372 | wscript.shell |
|
Details | Domain | 6 | sh.run |
|
Details | Domain | 2 | ourvjworm.duckdns.org |
|
Details | Domain | 285 | microsoft.net |
|
Details | Domain | 93 | bazaar.abuse.ch |
|
Details | File | 46 | microsoft.xml |
|
Details | File | 70 | vbc.exe |
|
Details | md5 | 2 | b226987db14d44762e9ebefcda95e144 |
|
Details | sha1 | 2 | d86eac68820c39703e52142d3bf450525a9f8d6c |
|
Details | sha256 | 2 | 6de643d185952a9903ab06d382c4373e516329536734d90be309004afaa5ea50 |
|
Details | Url | 1 | http://ourvjworm.duckdns.org:7974 |
|
Details | Url | 1 | http://ourvjworm.duckdns.org/vre |
|
Details | Url | 1 | https://bazaar.abuse.ch/download/6de643d185952a9903ab06d382c4373e516329536734d90be309004afaa5ea50 |
|
Details | Windows Registry Key | 3 | HKCU\vjw0rm |
|
Details | Windows Registry Key | 1 | HKLM\SOFTWARE\Classes |