General

  • Target

    a4668c29be9951320ab96983772a7ca6819e9c511502243ac8543b1879d6ed09

  • Size

    82KB

  • Sample

    240226-1r5evshe61

  • MD5

    7929c97ce63fe3cdacfc7352dc166de4

  • SHA1

    01ba4443631259f15e9b699a1bb5da740ac2db5b

  • SHA256

    a4668c29be9951320ab96983772a7ca6819e9c511502243ac8543b1879d6ed09

  • SHA512

    8785c0a0b54965d7e1d8f7936c9d7c0be72a1947f83821620b76428917cdbf0895d1de508262eb0f97743b82c5d989da45573faeffd0be207c854f27de18733e

  • SSDEEP

    1536:Ys0U6gprfN7+KvoGAoQ2CdLzbYaaPFIs8Ja1cu:YI6Art+z3LkaA1

Malware Config

Targets

    • Target

      a4668c29be9951320ab96983772a7ca6819e9c511502243ac8543b1879d6ed09

    • Size

      82KB

    • MD5

      7929c97ce63fe3cdacfc7352dc166de4

    • SHA1

      01ba4443631259f15e9b699a1bb5da740ac2db5b

    • SHA256

      a4668c29be9951320ab96983772a7ca6819e9c511502243ac8543b1879d6ed09

    • SHA512

      8785c0a0b54965d7e1d8f7936c9d7c0be72a1947f83821620b76428917cdbf0895d1de508262eb0f97743b82c5d989da45573faeffd0be207c854f27de18733e

    • SSDEEP

      1536:Ys0U6gprfN7+KvoGAoQ2CdLzbYaaPFIs8Ja1cu:YI6Art+z3LkaA1

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks