General

  • Target

    136475f8c1a1c7f23d87ea255926df15

  • Size

    19KB

  • Sample

    231230-kchpjsafgp

  • MD5

    136475f8c1a1c7f23d87ea255926df15

  • SHA1

    a2f0c5d389116df32e96c5e03210c370ea04da09

  • SHA256

    ef941e9a12dd57020e8c110e4978fb953b3d41f482f650184980318676fd0408

  • SHA512

    577ea90c902e95dd8ce1bf8227fad2439023d52733c57ccf3d1fe20e21c19b14529f1e23e75ef756b28c0c83d03c1a0a0e09ab5d04208a019647c15a2f5b070e

  • SSDEEP

    384:tKeUYgnd2MQ4uR/1/G/uDOshOKD74FFspa1nd+kVJ7SvQk1wT66ftab:/gBQ4ugYOA7YFs0sQkGTzFab

Malware Config

Targets

    • Target

      136475f8c1a1c7f23d87ea255926df15

    • Size

      19KB

    • MD5

      136475f8c1a1c7f23d87ea255926df15

    • SHA1

      a2f0c5d389116df32e96c5e03210c370ea04da09

    • SHA256

      ef941e9a12dd57020e8c110e4978fb953b3d41f482f650184980318676fd0408

    • SHA512

      577ea90c902e95dd8ce1bf8227fad2439023d52733c57ccf3d1fe20e21c19b14529f1e23e75ef756b28c0c83d03c1a0a0e09ab5d04208a019647c15a2f5b070e

    • SSDEEP

      384:tKeUYgnd2MQ4uR/1/G/uDOshOKD74FFspa1nd+kVJ7SvQk1wT66ftab:/gBQ4ugYOA7YFs0sQkGTzFab

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks