General

  • Target

    PO.211071(123).jar

  • Size

    645KB

  • Sample

    211207-nt141ahaar

  • MD5

    a114fe4550c52315ccac4b1fa42341a1

  • SHA1

    cc572372b215e0f17fcfc04170dc3256f345f3c2

  • SHA256

    b2cfb719020e4c18fe7978bdf369e5c1fae69dd83260308747c608f4bdd8ecdb

  • SHA512

    60d097590b7291593180b80591d64bb7de36ef586db28f45d4b625bdbf036f98ddf5648e2aeaab016efe103034fc0335ed7fe38275cc11c5f8135379faadb2b0

Malware Config

Targets

    • Target

      PO.211071(123).jar

    • Size

      645KB

    • MD5

      a114fe4550c52315ccac4b1fa42341a1

    • SHA1

      cc572372b215e0f17fcfc04170dc3256f345f3c2

    • SHA256

      b2cfb719020e4c18fe7978bdf369e5c1fae69dd83260308747c608f4bdd8ecdb

    • SHA512

      60d097590b7291593180b80591d64bb7de36ef586db28f45d4b625bdbf036f98ddf5648e2aeaab016efe103034fc0335ed7fe38275cc11c5f8135379faadb2b0

    • AdWind

      A Java-based RAT family operated as malware-as-a-service.

    • UAC bypass

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Disables Task Manager via registry modification

    • Disables use of System Restore points

    • Sets file execution options in registry

    • Drops startup file

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Modify Registry

3
T1112

Discovery

System Information Discovery

1
T1082

Impact

Inhibit System Recovery

1
T1490

Tasks