General

  • Target

    justificante.jar

  • Size

    647KB

  • Sample

    220620-l3cfwscbel

  • MD5

    f2862159a6e80713e03cf09ad149b4e3

  • SHA1

    740f32542b8e53908e02f3db0234736648085236

  • SHA256

    2b4db73f2e681b7f7d5b0b4cee46453428c4dd3c9c94070ef8840fc73a54d58a

  • SHA512

    8c62ee4181f42f66004dd15317842d9bd56fbceecd6628a7146c0774605bc6ba157f5028eb4900618f38d0308304252081eabf21a419a8befb7c03774b9318a6

Malware Config

Targets

    • Target

      justificante.jar

    • Size

      647KB

    • MD5

      f2862159a6e80713e03cf09ad149b4e3

    • SHA1

      740f32542b8e53908e02f3db0234736648085236

    • SHA256

      2b4db73f2e681b7f7d5b0b4cee46453428c4dd3c9c94070ef8840fc73a54d58a

    • SHA512

      8c62ee4181f42f66004dd15317842d9bd56fbceecd6628a7146c0774605bc6ba157f5028eb4900618f38d0308304252081eabf21a419a8befb7c03774b9318a6

    • AdWind

      A Java-based RAT family operated as malware-as-a-service.

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks