General

  • Target

    Order Specifications.pdf.htm.zip

  • Size

    95KB

  • Sample

    231030-ktfaradg53

  • MD5

    398b669082fa08a80789b604b3a83051

  • SHA1

    2248f1d0a0cdd13e99c72d9feda4583379d45410

  • SHA256

    ed72bc404ec337cec45f1abdf37571e0397b8186a079f2ad58b0c171a0e3e4c2

  • SHA512

    d3c99b0056382078003e4a0af36c72aa58f9b67f1d30a2437b1f92a8ca7d075621d1884127f80f539cd713206e68859d5ac85575952167508de0bfcdc41c1b81

  • SSDEEP

    1536:R1Q2o0/hxdOxvSUFQMg0RabnkwNFVN5dqALFcYUstc9Il94QM+ntqyBp06QWwBaN:R+2bdvUFRa7kw5dqUBxtcWYnWMyI6QWb

Malware Config

Targets

    • Target

      Order Specifications.pdf.htm

    • Size

      127KB

    • MD5

      8d2855d34692cd5417bfd21adbb1634d

    • SHA1

      8f67897cd88b9dfa12f5e45e9df122fb535dc8c6

    • SHA256

      637ecc50435b38915fc3d8bbd7f84133045c838258b343cafac112916053af37

    • SHA512

      0dc734c34b7eb5f377b614af476c8db946917e2a12645404737cd35b833aab97e4a5a3d064878f0444746674fd24c07991a3da051719a352a408246cdd64c6c3

    • SSDEEP

      3072:SgIX4IUtjxktYlaPsM8AK863Srla3Ca/5eYCG4X/Fn8GfXoEhNfyJxsKlR:SnIIUtCuluob3Yha/5eY4vFnhfXkyKlR

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks