General

  • Target

    cf8263bd95c97a1b5e3932134a9172c5.bin

  • Size

    3KB

  • Sample

    230301-b8jgaaeb23

  • MD5

    c9e638ef6d6b4ac5e941b2c71937c258

  • SHA1

    e20da0792dcc227a392f1ddeea8a7e8241765fb0

  • SHA256

    81b9f8cbef011f498682a359eb362e8ba25fb5cb18a7c6197d5ea22a05ffde04

  • SHA512

    7932fb9183b737e2f0c9285cc275bd28b14dd915d4eea332f45da13ef533dba48e9542ebef39c35a3f31f317cb6748fdc1b426af51079c9f139afd4faa62407a

Malware Config

Extracted

Family

vjw0rm

C2

http://66.154.102.135:9909

Targets

    • Target

      3e61b1cfc096af4b8b8371daaf4f233af9d00286232d16159b3ce77a17f3dba7.unknown

    • Size

      99KB

    • MD5

      cf8263bd95c97a1b5e3932134a9172c5

    • SHA1

      a9b0e170b17e8236b7e55c9399411ef173422737

    • SHA256

      3e61b1cfc096af4b8b8371daaf4f233af9d00286232d16159b3ce77a17f3dba7

    • SHA512

      c59b797ff20cd94769db06012187d0f54ca8701c3a4bd92ed1661242311e29e6d6ea14fac65fb2607646ab577ef1d5f6351e105a0aa64d3039604d8bbef69ead

    • SSDEEP

      192:nluzi75WbAZvs1hdh12cB5kw94tMa3dZYkVdPrv1kc4uIVLk5/lWWWnazewBB5je:cz5Kyy24jHuMqWWyB1KSqmjm

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks