General

  • Target

    njmyettnik

  • Size

    1.7MB

  • Sample

    240425-k7v85ahd28

  • MD5

    54c3af244b903c34bc75114d6c646a7c

  • SHA1

    ab8361b65b43961d09f26bf9e30ecda857d63038

  • SHA256

    04794d83a3b53d9d2267376f061e61b970545ca95a7d0d5f863f5f08d2a8484e

  • SHA512

    faf6e88481e052a2a3b0814a250746b0dd36ba41b7cf766a5308535c5f6ae0042447a769737bce0b0ef0542631bdd8d5381712f9f9622100867620b49cbbe8d6

  • SSDEEP

    24576:PcX5jU8K3wU/qkyvKTmTWRTJ2OSy1LJx2DJpp6UY8X9UogttxldmtdAMPkIJxe3L:Px7tZHfY7AHk+

Malware Config

Targets

    • Target

      njmyettnik

    • Size

      1.7MB

    • MD5

      54c3af244b903c34bc75114d6c646a7c

    • SHA1

      ab8361b65b43961d09f26bf9e30ecda857d63038

    • SHA256

      04794d83a3b53d9d2267376f061e61b970545ca95a7d0d5f863f5f08d2a8484e

    • SHA512

      faf6e88481e052a2a3b0814a250746b0dd36ba41b7cf766a5308535c5f6ae0042447a769737bce0b0ef0542631bdd8d5381712f9f9622100867620b49cbbe8d6

    • SSDEEP

      24576:PcX5jU8K3wU/qkyvKTmTWRTJ2OSy1LJx2DJpp6UY8X9UogttxldmtdAMPkIJxe3L:Px7tZHfY7AHk+

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Modifies file permissions

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Defense Evasion

File and Directory Permissions Modification

1
T1222

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks