General

  • Target

    dc4097eadf7729f28635a6b37f9c2c74

  • Size

    128KB

  • Sample

    240321-wgt4xsdh72

  • MD5

    dc4097eadf7729f28635a6b37f9c2c74

  • SHA1

    78e690f2642201cbb7a9a77075ed616a80118e84

  • SHA256

    16feda82f86ae7863bd19b0d893b737578206810a0e4366b45150b2c48aa73f4

  • SHA512

    f0212dd3372bf676a666b7af33f78270cd7ef9c958e24f218d1ecab7b4ebfcc8399c03b962509846d9ff3d8ffd074009d23dd3fe425e6aa4c6985942dc6eed8e

  • SSDEEP

    3072:IQyD+j9CG5q5TkzxA94o4XjobqedHHrvR+kG4mbjLHW0t/Vdjqa:IQoY9t5mTuxA9gj3edHHrv0bjLHW0t/5

Malware Config

Targets

    • Target

      dc4097eadf7729f28635a6b37f9c2c74

    • Size

      128KB

    • MD5

      dc4097eadf7729f28635a6b37f9c2c74

    • SHA1

      78e690f2642201cbb7a9a77075ed616a80118e84

    • SHA256

      16feda82f86ae7863bd19b0d893b737578206810a0e4366b45150b2c48aa73f4

    • SHA512

      f0212dd3372bf676a666b7af33f78270cd7ef9c958e24f218d1ecab7b4ebfcc8399c03b962509846d9ff3d8ffd074009d23dd3fe425e6aa4c6985942dc6eed8e

    • SSDEEP

      3072:IQyD+j9CG5q5TkzxA94o4XjobqedHHrvR+kG4mbjLHW0t/Vdjqa:IQoY9t5mTuxA9gj3edHHrv0bjLHW0t/5

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Modifies file permissions

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks