General

  • Target

    9674d32d4f08b3ab045d81a9d64c5e57

  • Size

    125KB

  • Sample

    240212-gxypqaed6x

  • MD5

    9674d32d4f08b3ab045d81a9d64c5e57

  • SHA1

    59f7b5a07e7877fe54c1776e4007cfef26f5c050

  • SHA256

    8f6731af469a59bf034f934876708ac2f9fc17b111a94e0ce750f56d6d927d42

  • SHA512

    32702cdfdcd30ee7738749c9fa492cccfef15159bf7d3ed669ce10830700cc761c2a8f8006f13ba64c2892356b716f186a07a4128e4f402c360eb05b90e6dcce

  • SSDEEP

    3072:SjoGR9+qynt/8Ky6nLu8fUvg740E+pJcf+LMb+6B0j:SuabY9Uvkd73cGLY+6B0j

Malware Config

Targets

    • Target

      9674d32d4f08b3ab045d81a9d64c5e57

    • Size

      125KB

    • MD5

      9674d32d4f08b3ab045d81a9d64c5e57

    • SHA1

      59f7b5a07e7877fe54c1776e4007cfef26f5c050

    • SHA256

      8f6731af469a59bf034f934876708ac2f9fc17b111a94e0ce750f56d6d927d42

    • SHA512

      32702cdfdcd30ee7738749c9fa492cccfef15159bf7d3ed669ce10830700cc761c2a8f8006f13ba64c2892356b716f186a07a4128e4f402c360eb05b90e6dcce

    • SSDEEP

      3072:SjoGR9+qynt/8Ky6nLu8fUvg740E+pJcf+LMb+6B0j:SuabY9Uvkd73cGLY+6B0j

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Modifies file permissions

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks