General

  • Target

    ReceiptCopy.js

  • Size

    25KB

  • Sample

    210226-cpssa53k3s

  • MD5

    ea0364f70362a4980db75ec2daf47dd7

  • SHA1

    3d8816bf7bb284811f39cb8334b8a98b7ceccc40

  • SHA256

    b96407d5400aada01adfb86753604efa9e291a0b30d96f90d5897a1596947f4b

  • SHA512

    af121da57ca5cc200ad5a3d216f95e4fa0d11257c6d4d1951978ed8f12e7991e133e8e5aca65cd0ef2fdcdce04d67bcaee082c905d6c809246d2bfed2b1628cf

Score
10/10

Malware Config

Targets

    • Target

      ReceiptCopy.js

    • Size

      25KB

    • MD5

      ea0364f70362a4980db75ec2daf47dd7

    • SHA1

      3d8816bf7bb284811f39cb8334b8a98b7ceccc40

    • SHA256

      b96407d5400aada01adfb86753604efa9e291a0b30d96f90d5897a1596947f4b

    • SHA512

      af121da57ca5cc200ad5a3d216f95e4fa0d11257c6d4d1951978ed8f12e7991e133e8e5aca65cd0ef2fdcdce04d67bcaee082c905d6c809246d2bfed2b1628cf

    Score
    10/10
    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks