General

  • Target

    786cd57e65ffb85f2e19b3d2ef3dc0bf

  • Size

    31KB

  • Sample

    240126-z8w95sefc5

  • MD5

    786cd57e65ffb85f2e19b3d2ef3dc0bf

  • SHA1

    e36e41a8bb11ec29f90e0b3c643e2707d2a2f255

  • SHA256

    68921406e9b3c27e573cbf28f5d12a5b46cb40501384feaf13e4e3f753246d2c

  • SHA512

    45d85f01d0b2b2f8bb13e886ec8015c0f8d906b9041910ad94c2be2de4557c312f36cf018ccf37bb6fa362b1a6a49da674a08687691e78e78855206cb6cdcb99

  • SSDEEP

    768:4NMji4v+cUwNgwskCb+dLzN2V8NGw3WSk/cY03l83:UMDbU65FkqNGAZkUU

Malware Config

Targets

    • Target

      786cd57e65ffb85f2e19b3d2ef3dc0bf

    • Size

      31KB

    • MD5

      786cd57e65ffb85f2e19b3d2ef3dc0bf

    • SHA1

      e36e41a8bb11ec29f90e0b3c643e2707d2a2f255

    • SHA256

      68921406e9b3c27e573cbf28f5d12a5b46cb40501384feaf13e4e3f753246d2c

    • SHA512

      45d85f01d0b2b2f8bb13e886ec8015c0f8d906b9041910ad94c2be2de4557c312f36cf018ccf37bb6fa362b1a6a49da674a08687691e78e78855206cb6cdcb99

    • SSDEEP

      768:4NMji4v+cUwNgwskCb+dLzN2V8NGw3WSk/cY03l83:UMDbU65FkqNGAZkUU

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks