2023-04-21 13:25:09 +00:00
{
2023-12-14 14:30:15 +00:00
"Event" : {
"analysis" : "2" ,
"date" : "2017-08-03" ,
"extends_uuid" : "" ,
"info" : "OSINT - A Look at JS_POWMET, a Completely Fileless Malware" ,
"publish_timestamp" : "1501744556" ,
"published" : true ,
"threat_level_id" : "3" ,
"timestamp" : "1501744539" ,
"uuid" : "5982cc0a-db3c-40f9-9873-e54e02de0b81" ,
"Orgc" : {
"name" : "CIRCL" ,
"uuid" : "55f6ea5e-2c60-40e5-964f-47a8950d210f"
} ,
"Tag" : [
{
"colour" : "#ffffff" ,
2024-04-05 12:15:17 +00:00
"local" : false ,
2023-12-14 14:30:15 +00:00
"name" : "tlp:white" ,
"relationship_type" : ""
}
] ,
"Attribute" : [
{
"category" : "External analysis" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : false ,
"timestamp" : "1501744539" ,
"to_ids" : false ,
"type" : "text" ,
"uuid" : "5982cc1c-0170-4580-bbf0-e4a202de0b81" ,
"value" : "As cybercriminals start to focus on pulling off attacks without leaving a trace, fileless malware, such as the recent SOREBRECT ransomware, will become a more common attack method. However, many of these malware are fileless only while entering a user\u00e2\u20ac\u2122s system, as they eventually reveal themselves when they execute their payload. Attacks that use completely fileless malware are a rare occurrence, so we thought it important to discuss a new trojan known as JS_POWMET (Detected by Trend Micro as JS_POWMET.DE), which arrives via an autostart registry procedure. By utilizing a completely fileless infection chain, the malware will be more difficult to analyze using a sandbox, making it more difficult for anti-malware engineers to examine.\r\n\r\nInitial reports from our Smart Protection Network (SPN) data reveals JS_POWMET affecting APAC the most, with almost 90% of the infections coming from the region." ,
"Tag" : [
{
"colour" : "#00223b" ,
2024-04-05 12:15:17 +00:00
"local" : false ,
2023-12-14 14:30:15 +00:00
"name" : "osint:source-type=\"blog-post\"" ,
"relationship_type" : ""
}
]
} ,
{
"category" : "External analysis" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : false ,
"timestamp" : "1501744539" ,
"to_ids" : false ,
"type" : "link" ,
"uuid" : "5982cc29-8840-4c94-84a8-e78402de0b81" ,
"value" : "http://blog.trendmicro.com/trendlabs-security-intelligence/look-js_powmet-completely-fileless-malware/" ,
"Tag" : [
{
"colour" : "#00223b" ,
2024-04-05 12:15:17 +00:00
"local" : false ,
2023-12-14 14:30:15 +00:00
"name" : "osint:source-type=\"blog-post\"" ,
"relationship_type" : ""
}
]
} ,
{
"category" : "Payload delivery" ,
"comment" : "TROJ_PSINJECT.A" ,
"deleted" : false ,
"disable_correlation" : false ,
"timestamp" : "1501744539" ,
"to_ids" : true ,
"type" : "sha256" ,
"uuid" : "5982cc88-5c08-41f0-8089-c46702de0b81" ,
"value" : "7004b6c1829a745002feb7fbb0aad1a4d32c640a6c257dc8d0c39ce7b63b58cc"
} ,
{
"category" : "Payload delivery" ,
"comment" : "JS_POWMET.DE" ,
"deleted" : false ,
"disable_correlation" : false ,
"timestamp" : "1501744539" ,
"to_ids" : true ,
"type" : "sha256" ,
"uuid" : "5982cc88-602c-40a7-aa70-c46702de0b81" ,
"value" : "e27f417b96a33d8449f6cf00b8306160e2f1b845ca2c9666081166620651a3ae"
} ,
{
"category" : "Payload delivery" ,
"comment" : "BKDR_ANDROM.ETIN" ,
"deleted" : false ,
"disable_correlation" : false ,
"timestamp" : "1501744539" ,
"to_ids" : true ,
"type" : "sha256" ,
"uuid" : "5982cc88-d6a0-4a83-aa9a-c46702de0b81" ,
"value" : "bff21cbf95da5f3149c67f2c0f2576a6de44fa9d0cb093259c9a5db919599940"
} ,
{
"category" : "Payload delivery" ,
"comment" : "BKDR_ANDROM.ETIN - Xchecked via VT: bff21cbf95da5f3149c67f2c0f2576a6de44fa9d0cb093259c9a5db919599940" ,
"deleted" : false ,
"disable_correlation" : false ,
"timestamp" : "1501744539" ,
"to_ids" : true ,
"type" : "sha1" ,
"uuid" : "5982cd9b-d078-4bf7-9650-c41602de0b81" ,
"value" : "5ef5fbb4fe16133f05f77b9ec33e2f484cfa70db"
} ,
{
"category" : "Payload delivery" ,
"comment" : "BKDR_ANDROM.ETIN - Xchecked via VT: bff21cbf95da5f3149c67f2c0f2576a6de44fa9d0cb093259c9a5db919599940" ,
"deleted" : false ,
"disable_correlation" : false ,
"timestamp" : "1501744539" ,
"to_ids" : true ,
"type" : "md5" ,
"uuid" : "5982cd9b-bd40-4a53-85db-c41602de0b81" ,
"value" : "ad7cd3237ed058b7bda6e72af9d61e0e"
} ,
{
"category" : "External analysis" ,
"comment" : "BKDR_ANDROM.ETIN - Xchecked via VT: bff21cbf95da5f3149c67f2c0f2576a6de44fa9d0cb093259c9a5db919599940" ,
"deleted" : false ,
"disable_correlation" : false ,
"timestamp" : "1501744539" ,
"to_ids" : false ,
"type" : "link" ,
"uuid" : "5982cd9b-62d4-42c9-bddb-c41602de0b81" ,
"value" : "https://www.virustotal.com/file/bff21cbf95da5f3149c67f2c0f2576a6de44fa9d0cb093259c9a5db919599940/analysis/1501703489/"
} ,
{
"category" : "Payload delivery" ,
"comment" : "JS_POWMET.DE - Xchecked via VT: e27f417b96a33d8449f6cf00b8306160e2f1b845ca2c9666081166620651a3ae" ,
"deleted" : false ,
"disable_correlation" : false ,
"timestamp" : "1501744539" ,
"to_ids" : true ,
"type" : "sha1" ,
"uuid" : "5982cd9b-2930-469a-999b-c41602de0b81" ,
"value" : "ff3d0b399eec8675c5df8360aeb29daab0e5062b"
} ,
{
"category" : "Payload delivery" ,
"comment" : "JS_POWMET.DE - Xchecked via VT: e27f417b96a33d8449f6cf00b8306160e2f1b845ca2c9666081166620651a3ae" ,
"deleted" : false ,
"disable_correlation" : false ,
"timestamp" : "1501744539" ,
"to_ids" : true ,
"type" : "md5" ,
"uuid" : "5982cd9b-75d0-4c48-9ebe-c41602de0b81" ,
"value" : "bf265e2d56750f7c8a358687eed6a3a9"
} ,
{
"category" : "External analysis" ,
"comment" : "JS_POWMET.DE - Xchecked via VT: e27f417b96a33d8449f6cf00b8306160e2f1b845ca2c9666081166620651a3ae" ,
"deleted" : false ,
"disable_correlation" : false ,
"timestamp" : "1501744539" ,
"to_ids" : false ,
"type" : "link" ,
"uuid" : "5982cd9b-d49c-416e-991b-c41602de0b81" ,
"value" : "https://www.virustotal.com/file/e27f417b96a33d8449f6cf00b8306160e2f1b845ca2c9666081166620651a3ae/analysis/1501700791/"
} ,
{
"category" : "Payload delivery" ,
"comment" : "TROJ_PSINJECT.A - Xchecked via VT: 7004b6c1829a745002feb7fbb0aad1a4d32c640a6c257dc8d0c39ce7b63b58cc" ,
"deleted" : false ,
"disable_correlation" : false ,
"timestamp" : "1501744539" ,
"to_ids" : true ,
"type" : "sha1" ,
"uuid" : "5982cd9b-eecc-40bf-a192-c41602de0b81" ,
"value" : "a5d3538940ca4b2418f491806f81ba66da343fa6"
} ,
{
"category" : "Payload delivery" ,
"comment" : "TROJ_PSINJECT.A - Xchecked via VT: 7004b6c1829a745002feb7fbb0aad1a4d32c640a6c257dc8d0c39ce7b63b58cc" ,
"deleted" : false ,
"disable_correlation" : false ,
"timestamp" : "1501744539" ,
"to_ids" : true ,
"type" : "md5" ,
"uuid" : "5982cd9b-b1e0-4707-9a7c-c41602de0b81" ,
"value" : "8a68142686238428480b7342c95e20c7"
} ,
{
"category" : "External analysis" ,
"comment" : "TROJ_PSINJECT.A - Xchecked via VT: 7004b6c1829a745002feb7fbb0aad1a4d32c640a6c257dc8d0c39ce7b63b58cc" ,
"deleted" : false ,
"disable_correlation" : false ,
"timestamp" : "1501744539" ,
"to_ids" : false ,
"type" : "link" ,
"uuid" : "5982cd9b-9114-48f7-90c8-c41602de0b81" ,
"value" : "https://www.virustotal.com/file/7004b6c1829a745002feb7fbb0aad1a4d32c640a6c257dc8d0c39ce7b63b58cc/analysis/1501703398/"
}
2023-04-21 13:25:09 +00:00
]
2023-12-14 14:30:15 +00:00
}
2023-04-21 13:25:09 +00:00
}