General

  • Target

    all_deob.txt

  • Size

    4KB

  • Sample

    210605-sasv4vv2r6

  • MD5

    2a3c6390d976aec2d7bb8c440a2a3a03

  • SHA1

    2162899c2d58eb3b80c917a14d408c5853aa7ef2

  • SHA256

    84df27403b7b9316e2c84b8212bea94b1ffaabfe22151fb9834d1524f69b0321

  • SHA512

    71c8a58ad5a5ca7af11cb5cc7366af46269d2ce908fb9cb162e26d461ab0be6f285cc0cd8d828ba2bba905cba236f66686ceabbc9b63ffed980f9cc6c134b84f

Score
10/10

Malware Config

Targets

    • Target

      all_deob.txt

    • Size

      4KB

    • MD5

      2a3c6390d976aec2d7bb8c440a2a3a03

    • SHA1

      2162899c2d58eb3b80c917a14d408c5853aa7ef2

    • SHA256

      84df27403b7b9316e2c84b8212bea94b1ffaabfe22151fb9834d1524f69b0321

    • SHA512

      71c8a58ad5a5ca7af11cb5cc7366af46269d2ce908fb9cb162e26d461ab0be6f285cc0cd8d828ba2bba905cba236f66686ceabbc9b63ffed980f9cc6c134b84f

    Score
    10/10
    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks