General

  • Target

    PT.No0021.jar

  • Size

    225KB

  • Sample

    230215-gmfq6aad89

  • MD5

    1e0babc6ad2de5834e1972ab0de99249

  • SHA1

    16dda1dd98fb9202efff2f2367f6b9c0740e59ec

  • SHA256

    c210c36fcfbab3776cbcb918a14a6e633454680e9d7bb4d88b6a3d46082711c7

  • SHA512

    98855427cd5e275c88004b5dce8614ea283ad32d11e6c6ed03680939c884c34b608505be964cf66d0bf00c00c424b66e07c4eef185ae00cbc450cbbdc9323ebd

  • SSDEEP

    6144:uMojbC0sFaSqVC0T9Hk18DemQ+EioNY+moVo:Uj+0mas0JxemPEiYVVo

Malware Config

Targets

    • Target

      PT.No0021.jar

    • Size

      225KB

    • MD5

      1e0babc6ad2de5834e1972ab0de99249

    • SHA1

      16dda1dd98fb9202efff2f2367f6b9c0740e59ec

    • SHA256

      c210c36fcfbab3776cbcb918a14a6e633454680e9d7bb4d88b6a3d46082711c7

    • SHA512

      98855427cd5e275c88004b5dce8614ea283ad32d11e6c6ed03680939c884c34b608505be964cf66d0bf00c00c424b66e07c4eef185ae00cbc450cbbdc9323ebd

    • SSDEEP

      6144:uMojbC0sFaSqVC0T9Hk18DemQ+EioNY+moVo:Uj+0mas0JxemPEiYVVo

    • STRRAT

      STRRAT is a remote access tool than can steal credentials and log keystrokes.

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks