General

  • Target

    758a8716e34bdc7cc046fcb9383216d9

  • Size

    9KB

  • Sample

    240125-z5ldgagdgl

  • MD5

    758a8716e34bdc7cc046fcb9383216d9

  • SHA1

    5faac5dd55211b967333205e71b9d934b14e88b5

  • SHA256

    a1ee2ea563a62ce42f154749f225613c13b6c5568a0e4d955a2c09895ac1a26e

  • SHA512

    1fba12f0bc766bcd8ebc3203dd2ef833f0f34f4fd53f435d9f224e97ba450886bb6ecf1aab92cc912a7eaa3e31e100f650a386051438449fcc01f01afa9acbb7

  • SSDEEP

    192:Q26V2Z59QMw8PlV0jwwYMtZ3i9LujB/52g5wip0ii/c6foy4jhRB:QzVs59oFj7P3v2g5zMFfoyIF

Malware Config

Targets

    • Target

      758a8716e34bdc7cc046fcb9383216d9

    • Size

      9KB

    • MD5

      758a8716e34bdc7cc046fcb9383216d9

    • SHA1

      5faac5dd55211b967333205e71b9d934b14e88b5

    • SHA256

      a1ee2ea563a62ce42f154749f225613c13b6c5568a0e4d955a2c09895ac1a26e

    • SHA512

      1fba12f0bc766bcd8ebc3203dd2ef833f0f34f4fd53f435d9f224e97ba450886bb6ecf1aab92cc912a7eaa3e31e100f650a386051438449fcc01f01afa9acbb7

    • SSDEEP

      192:Q26V2Z59QMw8PlV0jwwYMtZ3i9LujB/52g5wip0ii/c6foy4jhRB:QzVs59oFj7P3v2g5zMFfoyIF

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks