General

  • Target

    51870c24bd72f9fd10a0eef0f479e2b6

  • Size

    9KB

  • Sample

    240110-y7yk5sgfa2

  • MD5

    51870c24bd72f9fd10a0eef0f479e2b6

  • SHA1

    384138c6f53dabafbabc8431d35d8ce9c536d282

  • SHA256

    b959f4a0000dfd9a05f84022d4d08d6876ef7c8629e9a66d75dc4bfb0707b93e

  • SHA512

    ff8c5623663bd37cfc5dba1063b0309df60ed50f7d931fcd31ca9dd159cb344bbad9a953cf67bce9c910ebd5564d9bf2ff1438d8a564f997e615761d76c79a79

  • SSDEEP

    192:QfEwAGGp9IDNc3JP3nhoxkUykZ3hO65jDAji9JUY:QMZGGXN5P3nhNpCxOiUjinUY

Malware Config

Targets

    • Target

      51870c24bd72f9fd10a0eef0f479e2b6

    • Size

      9KB

    • MD5

      51870c24bd72f9fd10a0eef0f479e2b6

    • SHA1

      384138c6f53dabafbabc8431d35d8ce9c536d282

    • SHA256

      b959f4a0000dfd9a05f84022d4d08d6876ef7c8629e9a66d75dc4bfb0707b93e

    • SHA512

      ff8c5623663bd37cfc5dba1063b0309df60ed50f7d931fcd31ca9dd159cb344bbad9a953cf67bce9c910ebd5564d9bf2ff1438d8a564f997e615761d76c79a79

    • SSDEEP

      192:QfEwAGGp9IDNc3JP3nhoxkUykZ3hO65jDAji9JUY:QMZGGXN5P3nhNpCxOiUjinUY

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks