General

  • Target

    Play_Audio_Message_46sec.js

  • Size

    23KB

  • Sample

    231120-mpymmsfd45

  • MD5

    0fec59fc91143d58dfe0f0f14d4e5f08

  • SHA1

    76de24642195a5b6a14281fdbc457bc614916eba

  • SHA256

    94d7bd6201394056c5732fdf0064a2217edd83816f5805ff91b5db0b8f52f7a3

  • SHA512

    2278800a84137d9027ca95225ed7fd6cd06b34c7939464583cfd64e22db0217958b87d0584020fa38d0db3fbb33434b978b56e63651df716ac99580eac0f52be

  • SSDEEP

    384:Fuv8G5Esgus0/0tW2KPM3Ce5/F7C4sEgGz38dOQIOlkDxDM/5xAUZvqIRyi:gvVUusQrcCe5/F7C4sEzzMMQDlkdQ/7j

Malware Config

Targets

    • Target

      Play_Audio_Message_46sec.js

    • Size

      23KB

    • MD5

      0fec59fc91143d58dfe0f0f14d4e5f08

    • SHA1

      76de24642195a5b6a14281fdbc457bc614916eba

    • SHA256

      94d7bd6201394056c5732fdf0064a2217edd83816f5805ff91b5db0b8f52f7a3

    • SHA512

      2278800a84137d9027ca95225ed7fd6cd06b34c7939464583cfd64e22db0217958b87d0584020fa38d0db3fbb33434b978b56e63651df716ac99580eac0f52be

    • SSDEEP

      384:Fuv8G5Esgus0/0tW2KPM3Ce5/F7C4sEgGz38dOQIOlkDxDM/5xAUZvqIRyi:gvVUusQrcCe5/F7C4sEzzMMQDlkdQ/7j

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks