General

  • Target

    17a841e42f40423054ffebc9b5e61103

  • Size

    218KB

  • Sample

    231221-2ljrmsedgj

  • MD5

    17a841e42f40423054ffebc9b5e61103

  • SHA1

    8c51a8dcd3580b80ceb7b9d90d19853c77bcb3eb

  • SHA256

    145f869eddd77064bf0238142318242b67d4b8f0d731595a2c85560696486ea6

  • SHA512

    4a80a7b1905734e961a1d9e0210f77be62ca6f5002f2a7d5a2f755b4c23eb693ccea593a910bcb6c723f02e3f1f4c83dda07e8a710131b79fd2e41a558ecdc66

  • SSDEEP

    3072:wYrEQw480xR5JClJsw4Kd9CPSqSgPCamwYBOz++ucpqH5PSfL2a5YgjTZctPUIw5:qQq0P5SGwrG6qBnpucpqZPoP5YKZTV

Malware Config

Targets

    • Target

      17a841e42f40423054ffebc9b5e61103

    • Size

      218KB

    • MD5

      17a841e42f40423054ffebc9b5e61103

    • SHA1

      8c51a8dcd3580b80ceb7b9d90d19853c77bcb3eb

    • SHA256

      145f869eddd77064bf0238142318242b67d4b8f0d731595a2c85560696486ea6

    • SHA512

      4a80a7b1905734e961a1d9e0210f77be62ca6f5002f2a7d5a2f755b4c23eb693ccea593a910bcb6c723f02e3f1f4c83dda07e8a710131b79fd2e41a558ecdc66

    • SSDEEP

      3072:wYrEQw480xR5JClJsw4Kd9CPSqSgPCamwYBOz++ucpqH5PSfL2a5YgjTZctPUIw5:qQq0P5SGwrG6qBnpucpqZPoP5YKZTV

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Modifies file permissions

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks