General

  • Target

    JaffaCakes118_ed8e23c9297e8ead61aff74b1cf398c5fdcb1998ff8bc09baeece1ef9453061c

  • Size

    1.2MB

  • Sample

    241223-qhw21s1jbr

  • MD5

    c4d6e571926521af01c3b740e917166f

  • SHA1

    0838ac562d8c231f471ee016efd2c58f7e9d9f0e

  • SHA256

    ed8e23c9297e8ead61aff74b1cf398c5fdcb1998ff8bc09baeece1ef9453061c

  • SHA512

    4b68f6af82b4ec1211b54f02008694c31296a1f404dd9a25895ba455e918b957c1faa295d00729705fb31d0da0ba612b6c5a16fd3c0936871155b3215199743d

  • SSDEEP

    768:ASlrAr+zNWpOC99Gm3BLIgy4mKI22V8QqH:JlK+z6B3BLlyA

Malware Config

Targets

    • Target

      eReceipt.js

    • Size

      23KB

    • MD5

      f041d2da1a5839119c042afda5c966ad

    • SHA1

      78dee5cee82ae393737ddbff9ccf13ad460f6711

    • SHA256

      88831eb51e1546b02091a0b2508f19e82c1feea3fec4d4c10fac83e3df107677

    • SHA512

      1838dc189474e0896cc5e800d0595ede6a6bc0c6535a3eb247cb2b0525763c923615762de7857ade40ecd970b8b3ef0a33075d2bae9b22e2d5aad7ae0ba37a81

    • SSDEEP

      384:Jm3uw3bALv6vsBkAB0W8/u3ZOYEu/99BEm9e0M8LIgyfAmKI2KlVgPIfQI4AqRh3:klrAr+zNWpOC99Gm3BLIgy4mKI22V8QE

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Vjw0rm family

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks