General

  • Target

    c190431d_hyUa2Op4cf

  • Size

    207KB

  • Sample

    210910-fn57rscdbn

  • MD5

    c190431d51eed488359ebc98cbb2e900

  • SHA1

    eaa9bbf31cc5c32bc03cd146a3869a2b4abd29ee

  • SHA256

    cdf6af99c438ee1c8b18425afd23f07d30c745b89d4a3fdd6220c463a16844c0

  • SHA512

    540dab7e3443704b5ad54a5c8dbed684c44ab48d4feac6f5f6f372b847c1367e8808ece7b7a7af01bb178a8b88d42e86cd94dfea220043baf78f54542d90085e

Malware Config

Targets

    • Target

      c190431d_hyUa2Op4cf

    • Size

      207KB

    • MD5

      c190431d51eed488359ebc98cbb2e900

    • SHA1

      eaa9bbf31cc5c32bc03cd146a3869a2b4abd29ee

    • SHA256

      cdf6af99c438ee1c8b18425afd23f07d30c745b89d4a3fdd6220c463a16844c0

    • SHA512

      540dab7e3443704b5ad54a5c8dbed684c44ab48d4feac6f5f6f372b847c1367e8808ece7b7a7af01bb178a8b88d42e86cd94dfea220043baf78f54542d90085e

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks