General

  • Target

    8758146245.zip

  • Size

    232KB

  • Sample

    230112-e4yxysba5z

  • MD5

    0d90fb32cbae79136bf5f40df61f2d48

  • SHA1

    dbb1596140da36f4128003a2748bb948a37388b0

  • SHA256

    6f42ed8f3470aa85f36c0f445793e24d5ad2c7637df440bfe3ebc2816a42f8ba

  • SHA512

    4d9ccc44d8ea768a4fa567e65cf66a994066aeed93b4e017524e7eb5c0105ceb2f782ac53489658d7e1e9ceec0cf84e7aa8c801a622b8cd966b0e7015c4a629b

  • SSDEEP

    3072:DwjA+Y9xinzRefOXPzRdZNadhsqKM4dK1xslWuGvua/nhXRq267Q+4+fAfk:wufO/zfTpIZSWjvueXRqTlZ4fk

Malware Config

Targets

    • Target

      0de7b7c82d71f980e5261c40188bafc6d95c484a2bf7007828e93f16d9ae1d9a

    • Size

      91KB

    • MD5

      19d1b98ca53a49b901f056c6da2478d2

    • SHA1

      c94af0fd581ed91814de3f01be03e42e143493dd

    • SHA256

      0de7b7c82d71f980e5261c40188bafc6d95c484a2bf7007828e93f16d9ae1d9a

    • SHA512

      ae74c208cf339c2831d9b5574826538f9c48766d7a94ec3632569d06ec0306e271eab539bde4cbeeff632f5c2d043b7b64cb25cf575b67b4fddff60e3adaf198

    • SSDEEP

      1536:VWHSgmeG1irLi+dk1bGxutmWjdnzWPxy0I3hB9WOCTdEIcbs7l+tQg/OR9GT:uLmILs1b7X5WJy0wsOCTes7o1/a9GT

    • STRRAT

      STRRAT is a remote access tool than can steal credentials and log keystrokes.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Target

      2b0c9059feece8475c71fbbde6cf4963132c274cf7ddebafbf2b0a59523c532e

    • Size

      271KB

    • MD5

      56874c0b5d9fe1a62597098be19113cb

    • SHA1

      235b0c6b6ff8c2c667a3aca376e6d09bee039eee

    • SHA256

      2b0c9059feece8475c71fbbde6cf4963132c274cf7ddebafbf2b0a59523c532e

    • SHA512

      a1039448cf03ca10ef9d05cb3ebf418c45e2083964c9a66f7009beb7b36db41a979618813d0abf6cd03dc38c7709bf1aebe9cd11067afad2358a2145da109f2e

    • SSDEEP

      6144:jCPjENIBMqnbvmNETFwauvrb7gOhpFtwWIVyWT:jCPjENI6Cm6zSP9pFKWK

    Score
    10/10
    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks