General

  • Target

    Invoice#UGG4920.js

  • Size

    3KB

  • Sample

    210415-gdmdxn5ytn

  • MD5

    5845bba204893a2899990c6f119536d8

  • SHA1

    9545255f64fecd47dd67f83f997d344f788a7770

  • SHA256

    93875d799ab91a2cc3f21fe899a7e167053d3e2013430792ab997c1dbd40fbfb

  • SHA512

    d9a5cc3cfb67144ff8c5daeaad8a5545a16ae04e91100b144a66b49ab093462bfd4eca689159aef0ade87efb0113466fd058b4234200baa4ff8620af6725c70f

Malware Config

Targets

    • Target

      Invoice#UGG4920.js

    • Size

      3KB

    • MD5

      5845bba204893a2899990c6f119536d8

    • SHA1

      9545255f64fecd47dd67f83f997d344f788a7770

    • SHA256

      93875d799ab91a2cc3f21fe899a7e167053d3e2013430792ab997c1dbd40fbfb

    • SHA512

      d9a5cc3cfb67144ff8c5daeaad8a5545a16ae04e91100b144a66b49ab093462bfd4eca689159aef0ade87efb0113466fd058b4234200baa4ff8620af6725c70f

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks