General

  • Target

    Z0MAWQNP.js

  • Size

    9KB

  • Sample

    210513-fr7kjta6tj

  • MD5

    c762ecb478e0c810f43d96ed1613193d

  • SHA1

    15790279c1b8d576fbcf1c0ab76d09b9d82d3a50

  • SHA256

    1bb4b91c7bff835cd9ad0c1f59555cbdf1e2f1cde9c361eba79e1d720983760b

  • SHA512

    383949f966edd6c93c8f9696d1e0e4442b4ffba74bc33982b8fd2ae11bd4ce104eefa5159f63d4bbbe0834a74c5503e19f530b053139f29287c418366d620e34

Malware Config

Targets

    • Target

      Z0MAWQNP.js

    • Size

      9KB

    • MD5

      c762ecb478e0c810f43d96ed1613193d

    • SHA1

      15790279c1b8d576fbcf1c0ab76d09b9d82d3a50

    • SHA256

      1bb4b91c7bff835cd9ad0c1f59555cbdf1e2f1cde9c361eba79e1d720983760b

    • SHA512

      383949f966edd6c93c8f9696d1e0e4442b4ffba74bc33982b8fd2ae11bd4ce104eefa5159f63d4bbbe0834a74c5503e19f530b053139f29287c418366d620e34

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks