General

  • Target

    ORDER-218105.docx.js

  • Size

    647KB

  • Sample

    210810-zbfep46vaj

  • MD5

    48b712251e849852aac13fb40c12ccc7

  • SHA1

    886f19f88ab45e77c6f0dab1e1ad6e75e1b6d133

  • SHA256

    a13e8c01a39824718b9beb603a1247e48c98fe9d7b8b2770ecf5ebd7daeb6bb2

  • SHA512

    a10408cda86370772a7c0ecfef6b82be9f5a5bed4cb7c847aea80099672ab91349075f47cec8f57fee0a0df6ae1333f99afa10ffcbaa09aa72590f0b40ad37d8

Malware Config

Targets

    • Target

      ORDER-218105.docx.js

    • Size

      647KB

    • MD5

      48b712251e849852aac13fb40c12ccc7

    • SHA1

      886f19f88ab45e77c6f0dab1e1ad6e75e1b6d133

    • SHA256

      a13e8c01a39824718b9beb603a1247e48c98fe9d7b8b2770ecf5ebd7daeb6bb2

    • SHA512

      a10408cda86370772a7c0ecfef6b82be9f5a5bed4cb7c847aea80099672ab91349075f47cec8f57fee0a0df6ae1333f99afa10ffcbaa09aa72590f0b40ad37d8

    • Ratty

      Ratty is an open source Java Remote Access Tool.

    • Ratty Rat Payload

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks