General

  • Target

    da985273a6ca8dfb6a17ff26956a2e71

  • Size

    6KB

  • Sample

    240321-d65mvacc4z

  • MD5

    da985273a6ca8dfb6a17ff26956a2e71

  • SHA1

    cda0aff65ed3c91b4788f2f7216831cb1ed563ac

  • SHA256

    0aa2dd1f59a1d55cd5021244c1d7383cadbef5363c22718a4d9e47610af30d95

  • SHA512

    e0220201e4e60f7b3b88d6908f4c00cadf8c2fdc6dedaa895ac95b4dbee3de8525b020366840d01701a4719f13e4b0a9b4fbcc9e899e8b5d2e278b265e1993bf

  • SSDEEP

    192:QiPZL7nJuuuujra4G7Tbs5osDBHSB4KEzXbh:QMZPJuuuu/a3LDEh

Malware Config

Targets

    • Target

      da985273a6ca8dfb6a17ff26956a2e71

    • Size

      6KB

    • MD5

      da985273a6ca8dfb6a17ff26956a2e71

    • SHA1

      cda0aff65ed3c91b4788f2f7216831cb1ed563ac

    • SHA256

      0aa2dd1f59a1d55cd5021244c1d7383cadbef5363c22718a4d9e47610af30d95

    • SHA512

      e0220201e4e60f7b3b88d6908f4c00cadf8c2fdc6dedaa895ac95b4dbee3de8525b020366840d01701a4719f13e4b0a9b4fbcc9e899e8b5d2e278b265e1993bf

    • SSDEEP

      192:QiPZL7nJuuuujra4G7Tbs5osDBHSB4KEzXbh:QMZPJuuuu/a3LDEh

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks