General

  • Target

    POA-56.js

  • Size

    25KB

  • Sample

    210227-4fakt16sbn

  • MD5

    66a481d5f48631478e4bb4b5bdbce5c4

  • SHA1

    a2399bde1dcddcf77fb2025bb537c3c78d292d1d

  • SHA256

    c8e73238ae2e8627b8070796c0e23fbd65b832bdde0982e4e897e8796b8f15c6

  • SHA512

    f9d65d291cc7ad7d90c8e2265bfcfb8597d9ded4a77aab05ed7d7da2f59ccffedb7b974d4beb5dce184c3ca3c09c41d29e46a07aace38af6f5299d3d226114d6

Score
10/10

Malware Config

Targets

    • Target

      POA-56.js

    • Size

      25KB

    • MD5

      66a481d5f48631478e4bb4b5bdbce5c4

    • SHA1

      a2399bde1dcddcf77fb2025bb537c3c78d292d1d

    • SHA256

      c8e73238ae2e8627b8070796c0e23fbd65b832bdde0982e4e897e8796b8f15c6

    • SHA512

      f9d65d291cc7ad7d90c8e2265bfcfb8597d9ded4a77aab05ed7d7da2f59ccffedb7b974d4beb5dce184c3ca3c09c41d29e46a07aace38af6f5299d3d226114d6

    Score
    10/10
    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks