General

  • Target

    2837de7c12b43967fa14a8593245cb26

  • Size

    3.9MB

  • Sample

    231231-e41rjsbhcj

  • MD5

    2837de7c12b43967fa14a8593245cb26

  • SHA1

    46b5a0ea0571f5b0c543949cca006937f378ce18

  • SHA256

    ec6bacab189b6eb6ed566e0c49a6a41b3c01c28145051e733b578318060ad881

  • SHA512

    96a8f33cb279a0b1f5ac0c1475ffcad5d67b420a1b87e8965677dca96d48f305d335ed2626618fb0f52049d211ef0be9ab30665d49bc34c34d4082e2b26c15a1

  • SSDEEP

    98304:2bwHted1N2mcuVkch0CoSvmQAlXF6GN/Asr3/OWtvvv:2kNO/rkczoSeffL/z3/OCv

Malware Config

Targets

    • Target

      2837de7c12b43967fa14a8593245cb26

    • Size

      3.9MB

    • MD5

      2837de7c12b43967fa14a8593245cb26

    • SHA1

      46b5a0ea0571f5b0c543949cca006937f378ce18

    • SHA256

      ec6bacab189b6eb6ed566e0c49a6a41b3c01c28145051e733b578318060ad881

    • SHA512

      96a8f33cb279a0b1f5ac0c1475ffcad5d67b420a1b87e8965677dca96d48f305d335ed2626618fb0f52049d211ef0be9ab30665d49bc34c34d4082e2b26c15a1

    • SSDEEP

      98304:2bwHted1N2mcuVkch0CoSvmQAlXF6GN/Asr3/OWtvvv:2kNO/rkczoSeffL/z3/OCv

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks