General

  • Target

    4e5760b1_uI7k4PcJRS

  • Size

    199KB

  • Sample

    210910-fn3fwahcb5

  • MD5

    4e5760b162de6fee648883a978c3c862

  • SHA1

    034105297060b80483fce37a51f3217175ae9685

  • SHA256

    045c60e9555c07db3d4d813a4f47ecd5b54f7b1068e942350440e693b5b9f1fe

  • SHA512

    7fb855d63814031d511f4eb57aab606e7c03825459f0f1b55d5671193d8056b6bb541470e07db751d852033f32ab557bf549325645e74aa164f9a3c8031f322a

Malware Config

Targets

    • Target

      4e5760b1_uI7k4PcJRS

    • Size

      199KB

    • MD5

      4e5760b162de6fee648883a978c3c862

    • SHA1

      034105297060b80483fce37a51f3217175ae9685

    • SHA256

      045c60e9555c07db3d4d813a4f47ecd5b54f7b1068e942350440e693b5b9f1fe

    • SHA512

      7fb855d63814031d511f4eb57aab606e7c03825459f0f1b55d5671193d8056b6bb541470e07db751d852033f32ab557bf549325645e74aa164f9a3c8031f322a

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks